Your search for 46177 returns 6475 document(s) |
Readings and cases in the management of information security |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: how to plan for it and achive it |
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer organization 4th ed. |
Author: Hamacher, Carl; | Call Number: 004.22 Ham c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networks 4th ed. |
Author: Tenembaum, Anrew S.; | Call Number: 004.36 Tan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networks 4th ed. |
Author: Tanenbaum, Andrew S.; | Call Number: 004.6 Tan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: Cyber Security Body of Knowledge version 2.1 |
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: The Cyber Security Body of Knowledge version 1.0 |
Call Number: 005.8 Cyb | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security risk management building an information security risk management program from the ground up |
Call Number: 005.8 Whe s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security in the'90s :issues and solutions for managers/Thomas W. Madron |
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|