Search Result Save to File Save as CSV
Your search for 5574 returns 4375 document(s)
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Communication network
Author: Leon-Garcia, Alberto; | Call Number: 621.382 1 Leo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next