Search Result Save to File Save as CSV
Your search for 52807 returns 249 document(s)
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Insider strategies for outsourcing information systems:building productive partneships, avoiding seductive traps
Author: Ripin, Kathy M.; | Call Number: 658.401 22 Rip i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Library Review
Call Number: 45 (1996): 1-6 | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Review
Call Number: 32 (1992): 1 & 2 | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
The Ethics of Safety-Critical Systems
Author: Jonathan Bowen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Developments in e-government: a critical analysis
Call Number: 352.3 Dev | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information systems research
Call Number: 004.285 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical success factor of smart environment
Author: Bambang Aria Yudhithira; Dana Indra Sensuse; | Call Number: Mak T Jilid 096-120 (T-1316) (Mak T-115) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Critical success factors of smart environment
Author: Bambang Aria Yudhistira; | Call Number: TR-CSUI/019 (016-020) 2022 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Gatekeeping in the international journal literature of chemistry, page 1652
Author: Tibor Braun | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next