Search Result
Save to File
Your search for
5574
returns
4375
document(s)
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Communication network
Author: Leon-Garcia, Alberto; | Call Number: 621.382 1 Leo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next