Search Result
Save to File
Your search for
46339
returns
5204
document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer graphics: principles and practice 2nd ed
Call Number: 006.66 Com | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
The B-method: An introduction
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
A theory of objects
Author: Abadi, Martin; | Call Number: 005.131 Aba t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Communication network
Author: Leon-Garcia, Alberto; | Call Number: 621.382 1 Leo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Algorithmics: theory and practice/Gilles Brassard and Paul Bratley
Author: Brassard, Gilles; | Call Number: 511.5 Bra a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next