Advanced Search

  • SEARCHING...
  • SEARCHING...

Result Search
Found 63 from your keywords: Subject : "Keamanan"
You currently on page 3 of 7 page(s)
Query took 0.62583 second(s) to complete


 First Page   Previous   1   2   3   4   5   Next   Last Page 

The Superpower Myth: The Use and Misuse of American Might

Author(s) : Soderberg, Nancy -
Call Number : 355.033 SOD s
Availability : 1 copies available for loan

Critical Security Studies and World Politics

Author(s) : Booth, Ken -
Call Number : 355.033 BOO c
Availability : 3 copies available for loan

Police Reform: Taking the Heart and Mind

Author(s) : Prihantono, T. Hari - Evangeline, Jessica -
Call Number : 363.2 PRI p
Availability : 2 copies available for loan

Kriptografi: Keamanan Internet dan Jaringan Komunikasi

Author(s) : Yusuf Kurniawan -
Call Number : 005.8 KUR k
Availability : 1 copies available for loan

Network Security Bible

Author(s) : Cole, Eric - Krutz, Ronald - Conley, James W. -
Call Number : 005.8 COL n
Availability : 1 copies available for loan

Computer Security: 20 Things Every Employee Should Know, ed.2

Author(s) : Rothke, Ben -
Call Number : 005.8 ROT c
Availability : 1 copies available for loan

Caution! Wireless Networking : Preventing a Data Disaster

Author(s) : McCullough, Jack -
Call Number : 005.8 MCC c
Availability : 1 copies available for loan

Security in the Caribbean Basin: The Challenge of Regional Cooperation

Author(s) : Tulchin, Joseph S. - Espach, Ralph H. -
Call Number : 327.730729 TUL s
Availability : 1 copies available for loan

The De-Radicalization of Jihadists: Transforming Armed Islamist Movements

Author(s) : Ashour, Omar -
Call Number : 363.32516 ASH d
Availability : 2 copies available for loan

Guns and Butter: the Political Economy of International Security

Author(s) : Dombrowski, Peter -
Call Number : 355.033 DOM g
Availability : 1 copies available for loan
 First Page   Previous   1   2   3   4   5   Next   Last Page