Search Result Save to File Save as CSV
Your search for 46736 returns 5772 document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in communication networks/ Stelvio Cimato
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Faktor-faktor yang di perlukan untuk perancangan data center yang bisa bertumbuh dan sesuai untuk PT.Kinerja Indonesia
Author: Jus Widjaja; | Call Number: KA-669 (Softcopy KA-667) MAK KA-328 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Kebijakan Keamanan Informasi: Studi Kasus Instansi XYZ
Author: Thea Nisaa' Andi Saffanah; | Call Number: KA-1661 (Softcopy KA-1645) MAK KA-1296 | Edition: 2022 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next