Your search for 53018 returns 4349 document(s) |
Compliance analysis of IT investment governance practice to val IT 2.0 framework in Indonesian commercial bank: the XYZ Bank Case Study, Hal. 297-304 |
Author: Larastri Kumaralalita, Achmad Nizar Hidayanto; Dina Chahyati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITI security management/ |
Call Number: 658.403 8 Caz i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security alert, page 104 |
Author: George K. Campbell | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Database security integrity |
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security for computer systems |
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer Fraud & Security Bulletin |
Call Number: [6 (1983): 1,2,4-12, 6 (1984): 6, 7 (1984): 1-12, 8 (1985): 1-9,12, 9 (1986): 1-12, 10 (1987): 1-3, 10 (1987): 1-3] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer Security Journal |
Call Number: 11 (1983): 1 | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security metrics: a beginner's guide |
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing security architecture solution |
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|