Your search for 5574 returns 4375 document(s) |
Principles of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 2nd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 4th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security risk management building an information security risk management program from the ground up |
Call Number: 005.8 Whe s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in information security and assurance: third international conference and workshops, ISA 2009 Seoul, Korea, June 2009 Proceedings |
Call Number: 005.8 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building secure and reliable network applicatins/Kenneth P. Birman |
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|