Search Result Save to File Save as CSV
Your search for 53018 returns 4349 document(s)
Compliance analysis of IT investment governance practice to val IT 2.0 framework in Indonesian commercial bank: the XYZ Bank Case Study, Hal. 297-304
Author: Larastri Kumaralalita, Achmad Nizar Hidayanto; Dina Chahyati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security alert, page 104
Author: George K. Campbell | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Database security integrity
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer systems
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Fraud & Security Bulletin
Call Number: [6 (1983): 1,2,4-12, 6 (1984): 6, 7 (1984): 1-12, 8 (1985): 1-9,12, 9 (1986): 1-12, 10 (1987): 1-3, 10 (1987): 1-3] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Security Journal
Call Number: 11 (1983): 1 | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next