Search Result Save to File Save as CSV
Your search for 52932 returns 5293 document(s)
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer systems
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Iwbis 2019 the 4th international workshop on big data and information security October 11, 2019 NUsa Dua Bali Indonesia
Call Number: SEM-366 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Iwbis 2016 international workshop on big data and information security october 18-19th 2016 east jakarta indonesia
Call Number: SEM-340 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Iwbis 2017 international workshop on big data and information security september 23-24 2017 south jakarta indonesi
Call Number: SEM-187 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next