Search Result Save to File Save as CSV
Your search for 46339 returns 5204 document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics: principles and practice 2nd ed
Call Number: 006.66 Com | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
The B-method: An introduction
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A theory of objects
Author: Abadi, Martin; | Call Number: 005.131 Aba t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Communication network
Author: Leon-Garcia, Alberto; | Call Number: 621.382 1 Leo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Algorithmics: theory and practice/Gilles Brassard and Paul Bratley
Author: Brassard, Gilles; | Call Number: 511.5 Bra a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next