Search Result Save to File Save as CSV
Your search for 52932 returns 5293 document(s)
Secure Interoperability between Cooperating XML Systems by Dynamic Role Translation (866-875)
Author: Somchai Chatvichienchai Mizuho Iwaihara Yahiko Kambayashi; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Readings and cases in the management of information security
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 2nd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next