Facebook
Twitter
Youtube
Github
Forum
Select Language
Arabic
Bengali
Brazilian Portuguese
English
Espanol
German
Indonesian
Japanese
Thai
Malay
Persian
Accra Metropolitan University
e-learning Library
Home
Library Information
Member Area
Librarian
Help On Search
Librarian LOGIN
Collections
Back
Search
Search
Author(s)
SEARCHING...
Subject(s)
SEARCHING...
ISBN/ISSN
GMD
All GMD/Media
Accounting
Banking And Finance
Business Policy and Strategy
Communication
Computer Science
Corporate Governance
Cyber Security
Database Management
Economics
Energy Management
English Language
Entrepreneurship
Healthcare Management
Human Resource management
Information Technology
Introduction to Business
Law
Leadership
Makerting
Management
Mathematics
Nursing
Nutrition
Organisational Behaviour
Psychology
Public Administration
Purchasing and Supply Chain Ma
Research Method
Social Science
Statistic for Business
Strategic Management
WEB DESIGN
WEB Development
Collection Type
All Collections
Books
Conference Papers
Databases
Datasets
E-books
Journals and Magazies
Open Research Archive
Open Research Collections
Reference
Thesis and Dissertation
Location
All Locations
My Library
Advanced Search
Found
17126
from your keywords:
You currently on page
566
of
571
page(s)
Query took
0.0516
second(s) to complete
First Page
Previous
566
567
568
569
570
Next
Last Page
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk
Author(s)
: Shi-Cho Cha,Li-Ting Liu,Bo-Chen Yu -
Record Detail
XML Detail
Share to:
Learning Skills of Peace Through Every bay Conflicts
Record Detail
XML Detail
Share to:
Challenges andOpportunities of InformationTechnologyin the 90s
Record Detail
XML Detail
Share to:
Drug Testing Guidelinesand Practices for JuvenileProbation and ParoleAgencies
Record Detail
XML Detail
Share to:
Fundamentals of Information Systems
Author(s)
: Ralph M. Stair,George W. Reynolds -
Record Detail
XML Detail
Share to:
NATO AND TERRORISM On Scene: New Challenges for First Responders and Civil Protection
Author(s)
: Frances L. Edwards,Friedrich Steinhäusler -
Record Detail
XML Detail
Share to:
Defense and Environment : Effective Scientific Communication
Author(s)
: Katarina Mahutova,John J. Barich III,Ronald A. Kreizenbeck -
Record Detail
XML Detail
Share to:
ADVANCES IN FOOD SCIENCE AND NUTRITION
Author(s)
: Dr. YASHI SRIVASTAVA -
Record Detail
XML Detail
Share to:
Principles of Computer Security: CompTIA Security+â„¢ and Beyond Lab Manual Second Edition
Author(s)
: Vincent Nestler Wm. Arthur Conklin Gregory White Matthew Hirsch -
Record Detail
XML Detail
Share to:
Legal Aspects of International Trade
Author(s)
: World bank -
Record Detail
XML Detail
Share to:
Cryptography and Network Security Principles and Practices, Fourth Edition
Author(s)
: William Stallings -
Record Detail
XML Detail
Share to:
CompTIA Security+ SY0-301 Authorized Cert Guide
Author(s)
: David L. Prowse -
Record Detail
XML Detail
Share to:
INFORMATION INSECURITY A survival guide to the uncharted territories of cyber-threats and cyber-security
Author(s)
: Eduardo Gelbstein Ahmad Kamal -
Record Detail
XML Detail
Share to:
Generally Accepted System Security Principles
Author(s)
: Ralph Spencer Poore -
Record Detail
XML Detail
Share to:
Freedom of Information: A Comparative Legal Survey
Author(s)
: Toby Mendel -
Record Detail
XML Detail
Share to:
Facility Management Child Care Resource Book. Child CareOperations Center of Expertise.
Record Detail
XML Detail
Share to:
Computer and Information Security Handbook
Author(s)
: John R. Vacca -
Record Detail
XML Detail
Share to:
CS549: Cryptography and Network Security
Author(s)
: Xiang-Yang Li -
Record Detail
XML Detail
Share to:
The Basic Policy of Critical Information Infrastructure Protection
Record Detail
XML Detail
Share to:
Corporate Finance
Author(s)
: Saylor -
Record Detail
XML Detail
Share to:
Financial Management
Author(s)
: Timothy Gallagher -
Record Detail
XML Detail
Share to:
Information Security: Principles and Practices
Author(s)
: Mark S. Merkow Jim Breithaupt -
Record Detail
XML Detail
Share to:
Managing Information Security Risks: The OCTAVESM Approach
Author(s)
: Christopher Alberts, Audrey Dorofee -
Record Detail
XML Detail
Share to:
The Two Western Cultures of Privacy: Dignity versus Liberty
Author(s)
: James Q. Whitman -
Record Detail
XML Detail
Share to:
Skills for Health Skills-based health education including life skills: An important component of a Child-Friendly/Health-Promoting School
Record Detail
XML Detail
Share to:
Armed Conflict and Public Health A report on knowledge and knowledge gaps
Author(s)
: Debarati Guha-Sapir Willem G. van Panhuis -
Record Detail
XML Detail
Share to:
REPORTING IMPROPER PAYMENTS: A REPORT CARD ON AGENCIES' PROGRESS
Record Detail
XML Detail
Share to:
COMMENDATIONS TO IMPROVE THE PERFORMANCE OF THE SOCIAL SECURITY ADMINISTRATION AS AN INDEPENDENT AGENCY
Record Detail
XML Detail
Share to:
PUBLIC HEALTH SECURITY AND BIOTERRORISM PREPAREDNESS AND RESPONSE ACT OF 2002
Record Detail
XML Detail
Share to:
Principles of Information Security
Author(s)
: Michael E. Whitman,Herbert J. Mattord -
Record Detail
XML Detail
Share to:
First Page
Previous
566
567
568
569
570
Next
Last Page
Information
Welcome To AMU online Library. Use the search options to find your material in our library.
Search Cluster
Generating search cluster...