Search Result Save to File Save as CSV
Your search for 53018 returns 4402 document(s)
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research and application information security evaluation in website, Hal. 3462-3465
Author: Chungjing Si; Jianghe Yao; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security 2nd ed.
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management PT Goodyear Indonesia
Author: Luky Kurniawan; | Call Number: KP-1136 (Softkopi KP-699) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Information Security in the Islamic Perpective: The Principles and Practices (H33-H39)
Author: Sonny Zulhuda; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next