Search Result
Save to File
Your search for
46736
returns
5772
document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security in communication networks/ Stelvio Cimato
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Faktor-faktor yang di perlukan untuk perancangan data center yang bisa bertumbuh dan sesuai untuk PT.Kinerja Indonesia
Author: Jus Widjaja; | Call Number: KA-669 (Softcopy KA-667) MAK KA-328 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan Kebijakan Keamanan Informasi: Studi Kasus Instansi XYZ
Author: Thea Nisaa' Andi Saffanah; | Call Number: KA-1661 (Softcopy KA-1645) MAK KA-1296 | Edition: 2022 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next