Search Result
Save to File
Your search for
52807
returns
252
document(s)
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Insider strategies for outsourcing information systems:building productive partneships, avoiding seductive traps
Author: Ripin, Kathy M.; | Call Number: 658.401 22 Rip i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Library Review
Call Number: 45 (1996): 1-6 | Type: Jurnal/ Majalah
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer Review
Call Number: 32 (1992): 1 & 2 | Type: Jurnal/ Majalah
Find Similar
|
Add To Favorites
|
Detail in New Window
The Ethics of Safety-Critical Systems
Author: Jonathan Bowen | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Developments in e-government: a critical analysis
Call Number: 352.3 Dev | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information systems research
Call Number: 004.285 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical success factor of smart environment
Author: Bambang Aria Yudhithira; Dana Indra Sensuse; | Call Number: Mak T Jilid 096-120 (T-1316) (Mak T-115) | Type: Makalah Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical success factors of smart environment
Author: Bambang Aria Yudhistira; | Call Number: TR-CSUI/019 (016-020) 2022 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Gatekeeping in the international journal literature of chemistry, page 1652
Author: Tibor Braun | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next