Search Result Save to File Save as CSV
Your search for 4970 returns 4881 document(s)
Implementing the ISO/IEC 27001 ISMS standard 2nd ed.
Author: Humphreys, Edward; | Call Number: 005.8 Hum i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: Cyber Security Body of Knowledge version 2.1
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: The Cyber Security Body of Knowledge version 1.0
Call Number: 005.8 Cyb | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Musical applications of microprocessors/ Hal Chamberlin
Author: Chamberlin, Hal; | Call Number: 006.45 Cha m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing software for non-numeric applications/ William M. Waite
Author: Waite,William M.; | Call Number: 005.1 Wai i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer vision: advances and applications/Rangacher Kasturi ...[et.al]
Call Number: 621.399 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
An Introduction to data structures with applications
Author: Tremblay, Sorenson; | Call Number: 001.644 2 Tre i | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
PL/1 programming problems & applications
Author: Barnard, David T; | Call Number: 005.133 Bar p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next