Your search for 47467 returns 5627 document(s) |
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhigway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI |
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Context Aware Door Access Control on Private Room using Fuzzy Logic: Case Study of Smart House (155-160) |
Author: Yulistiyan Wardhana
Bob Hardian
Gladhi Guarddin
Hanif Rasyidi; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL) |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security in the'90s :issues and solutions for managers/Thomas W. Madron |
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas |
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|