Search Result Save to File Save as CSV
Your search for 12415 returns 2272 document(s)
Zachman framework approach in designing corporate information factory
Author: Kusuma Ayu Laksitowening; Bambang Riyanto; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian keamanan aplikasi WEB berbasis Microsoft ASP.NET berdasarkan Microsoft .NET Framework Security
Author: Budiman Ranamanggala; | Call Number: PA-0031 (Softcopy PA-0031) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Correlated failures, diversification, and information security risk management, page 397-422
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tecnology and security measures of sharing and applying supple chain information, 492-495
Author: Xiaaoli Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next