Search Result Save to File Save as CSV
Your search for 8867 returns 6531 document(s)
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Laporan diskusi panel teknologi dan sistem informasi
Call Number: SEM-110 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Manage it as a business: how to achieve alignment and add value to the company
Author: Lientz, Bennet P.; | Call Number: 004.068 4 Lie m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The CORBA reference guide: understanding the common object request broker architecture/Alan Pope
Author: Pope, Alan; | Call Number: 005.273 Pop c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next