Your search for 6734 returns 6972 document(s) |
Data smart: using data science to transform information into insight |
Author: Foreman, John D.; | Call Number: 005.72 For d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical security for IT/ Michael Erbschloe |
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of data security/ Ernst L. Leiss |
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data structures and program design in C/Robert L. Kruse |
Author: Kruse, Robert L.; | Call Number: 005.1 Kru d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Programming with data structures/Robert Leroy Kruse |
Author: Kruse, Robert Leroy; | Call Number: 005.133 Kru p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087 |
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data structures & program design 2nd ed/ Robert L. Kruse |
Author: Kruse, Robert L.; | Call Number: 005.1 Kru d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and communications security: strategies for the 1990 |
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management : Concepts and Practice |
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|