Search Result Save to File Save as CSV
Your search for 12359 returns 2219 document(s)
Software effort estimation and risk analysis a case study, HAL. 1002- 1007
Author: Mala V. Patil; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Designing a tool for IT governance risk compliance: a case study, Hal. 311-316
Author: Dewi Puspasari, M. Kasfu Hammni, Muhammad Sattar, Rein Nusa; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Study on using organizational knowledge to manage outsouring risk knowledge, Hal. 3618-3621
Author: Tong Shi; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Business familiarity as risk mitigation in software development outsourcing contracts, page 531-551
Author: David Gefen, Simon Wyss, and Yossi Lichtenstein | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A New Model for Evaluating Customers Lifetime Value in High Risk Markets
Author: Kaveh Ahmadi; Hamed Taherdoost; Samira Fakhravar; Neda Jalaliyoon; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk management/ I.C. Palmer; G.A. Potter
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Fuzzy sets, natural language computations, and risk analysis/ Kurt J. Schmucker
Author: Schmucker, Kurt J.; | Call Number: 511.322 Sch f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next