Facebook
Twitter
Youtube
Github
Forum
Select Language
Arabic
Bengali
Brazilian Portuguese
English
Espanol
German
Indonesian
Japanese
Thai
Malay
Persian
Accra Metropolitan University
e-learning Library
Home
Library Information
Member Area
Librarian
Help On Search
Librarian LOGIN
Collections
Back
Search
Search
Author(s)
SEARCHING...
Subject(s)
SEARCHING...
ISBN/ISSN
GMD
All GMD/Media
Accounting
Banking And Finance
Business Policy and Strategy
Communication
Computer Science
Corporate Governance
Cyber Security
Database Management
Economics
Energy Management
English Language
Entrepreneurship
Healthcare Management
Human Resource management
Information Technology
Introduction to Business
Law
Leadership
Makerting
Management
Mathematics
Nursing
Nutrition
Organisational Behaviour
Psychology
Public Administration
Purchasing and Supply Chain Ma
Research Method
Social Science
Statistic for Business
Strategic Management
WEB DESIGN
WEB Development
Collection Type
All Collections
Books
Conference Papers
Databases
Datasets
E-books
Journals and Magazies
Open Research Archive
Open Research Collections
Reference
Thesis and Dissertation
Location
All Locations
My Library
Advanced Search
Found
17126
from your keywords:
You currently on page
469
of
571
page(s)
Query took
0.64756
second(s) to complete
First Page
Previous
466
467
468
469
470
Next
Last Page
Professional Alfresco
Author(s)
: David Caruana, John Newton, Michael Farman, Michael G. Uzquiano, Kevin Roast -
Record Detail
XML Detail
Share to:
Comprehensive Study on Cybercrime
Record Detail
XML Detail
Share to:
Understanding cybercrime: Phenomena, challenges and legal response
Record Detail
XML Detail
Share to:
Black Book Network Security
Author(s)
: IXIA -
Record Detail
XML Detail
Share to:
THE SUSTAINABLE MARKETING OF TOURISM IN PROTECTED AREAS MOVING FORWARD
Author(s)
: Prof Chris Cooper -
Record Detail
XML Detail
Share to:
Science of Cyber-Security
Record Detail
XML Detail
Share to:
Productivity An Examination of Underlying Causes
Author(s)
: Zenon S. Zannetos, William B. Lindsley, Themis A. Papageorgiou, Ming-Je Tang, -
Record Detail
XML Detail
Share to:
Cyber Security Policy Guidebook
Author(s)
: Jennifer L. Bayuk - ason Healey - Paul Rohmeyer - Marcus H. Sachs - Jeffrey Schmidt - Joseph Weiss -
Record Detail
XML Detail
Share to:
Bitdefender Total Security 2015 User's Guide
Author(s)
: Bitdefender -
Record Detail
XML Detail
Share to:
THE CYBER SECURITY HANDBOOK
Record Detail
XML Detail
Share to:
BackTrack – Testing Wireless Network Security
Author(s)
: Kevin Cardwell -
Record Detail
XML Detail
Share to:
Pro Web Project Management
Author(s)
: Justin Emond and Chris Steins -
Record Detail
XML Detail
Share to:
The UK cyber security strategy: Landscape review
Record Detail
XML Detail
Share to:
Pro SQL Server 2008 Policy-Based Management
Author(s)
: Ken Simmons, Colin Stasiuk, Jorge Segarra -
Record Detail
XML Detail
Share to:
Cybersecurity and Business Vitality
Author(s)
: PAUL HOBBY - BOB HARVEY - UMESH VERMA -
Record Detail
XML Detail
Share to:
The Basics of Information Security
Author(s)
: Jason Andress - Russ Rogers -
Record Detail
XML Detail
Share to:
Pro Project Management with SharePoint 2010
Author(s)
: Mark J. Collins -
Record Detail
XML Detail
Share to:
Cyber Security Toolbox
Author(s)
: Michael Chesbro -
Record Detail
XML Detail
Share to:
CYBER RISK – A GLOBAL SYSTEMIC THREAT
Author(s)
: Mark Clancy Michael Leibrock -
Record Detail
XML Detail
Share to:
A PRACTICAL GUIDE TO LINUX COMMANDS, EDITORS AND SHELL PROGRAMMING
Author(s)
: Mark G. Sobell -
Record Detail
XML Detail
Share to:
Practical SharePoint 2013 Enterprise Content Management
Author(s)
: Steve Goodyear -
Record Detail
XML Detail
Share to:
Cyber-Readiness-Index 1.0
Record Detail
XML Detail
Share to:
Portfolio Simulation
Author(s)
: Peter P. Merten -
Record Detail
XML Detail
Share to:
The Cyber Index International Security Trends and Realities
Author(s)
: James Andrew Lewis - Götz Neuneck -
Record Detail
XML Detail
Share to:
CHINA’S CYBER POWER AND AMERICA’S NATIONAL SECURITY
Author(s)
: Colonel Jayson M. Spade - Jeffrey L. Caton -
Record Detail
XML Detail
Share to:
Cyber Security: Selected Legal Issues
Author(s)
: Edward C. Liu - Gina Stevens - Kathleen Ann Ruane - Alissa M. Dolan - Richard M. Thompson II -
Record Detail
XML Detail
Share to:
CYBER SECURITY ESSENTIALS
Author(s)
: James Graham Richard Howard Ryan Olson -
Record Detail
XML Detail
Share to:
Oracle Siebel CRM 8 Installation and Management
Author(s)
: Alexander Hansal -
Record Detail
XML Detail
Share to:
Collaborative Approaches for Medical Device and Healthcare Cybersecurity
Author(s)
: Suzanne B. Schwartz -
Record Detail
XML Detail
Share to:
Oracle Primavera Contract Management, Business Intelligence Publisher Edition v14
Author(s)
: Stephen D. Kelly -
Record Detail
XML Detail
Share to:
First Page
Previous
466
467
468
469
470
Next
Last Page
Information
Welcome To AMU online Library. Use the search options to find your material in our library.
Search Cluster
Generating search cluster...