Search Results for Computers -- Access control - Narrowed by: Computer security -- Management
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bManagement$002509Computer$002bsecurity$002b--$002bManagement$0026ps$003d300?dt=list
2024-04-25T12:02:25Z
ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD
ent://SD_ILS/0/SD_ILS:837878
2024-04-25T12:02:25Z
2024-04-25T12:02:25Z
by Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034149 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>
ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD
ent://SD_ILS/0/SD_ILS:837877
2024-04-25T12:02:25Z
2024-04-25T12:02:25Z
by Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>