Search Result
Save to File
Your search for
8867
returns
6531
document(s)
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Laporan diskusi panel teknologi dan sistem informasi
Call Number: SEM-110 | Type: Prosiding Seminar
Find Similar
|
Add To Favorites
|
Detail in New Window
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Manage it as a business: how to achieve alignment and add value to the company
Author: Lientz, Bennet P.; | Call Number: 004.068 4 Lie m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The CORBA reference guide: understanding the common object request broker architecture/Alan Pope
Author: Pope, Alan; | Call Number: 005.273 Pop c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
14
15
16
17
18
19
20
21
22
23
Next