Your search for 52932 returns 5293 document(s) |
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210 |
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and information security handbook |
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
COBIT 5 : For Information Security |
Call Number: 004.068 Cob | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security for computer systems |
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iwbis 2019 the 4th international workshop on big data and information security October 11, 2019 NUsa Dua Bali Indonesia |
Call Number: SEM-366 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iwbis 2016 international workshop on big data and information security october 18-19th 2016 east jakarta indonesia |
Call Number: SEM-340 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iwbis 2017 international workshop on big data and information security september 23-24 2017 south jakarta indonesi |
Call Number: SEM-187 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|