Your search for 4970 returns 4881 document(s) |
Implementing the ISO/IEC 27001 ISMS standard 2nd ed. |
Author: Humphreys, Edward; | Call Number: 005.8 Hum i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical security for IT/ Michael Erbschloe |
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: Cyber Security Body of Knowledge version 2.1 |
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: The Cyber Security Body of Knowledge version 1.0 |
Call Number: 005.8 Cyb | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA |
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Musical applications of microprocessors/ Hal Chamberlin |
Author: Chamberlin, Hal; | Call Number: 006.45 Cha m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing software for non-numeric applications/ William M. Waite |
Author: Waite,William M.; | Call Number: 005.1 Wai i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer vision: advances and applications/Rangacher Kasturi ...[et.al] |
Call Number: 621.399 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Introduction to data structures with applications |
Author: Tremblay, Sorenson; | Call Number: 001.644 2 Tre i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PL/1 programming problems & applications |
Author: Barnard, David T; | Call Number: 005.133 Bar p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|