Search Result Save to File Save as CSV
Your search for 25217 returns 2843 document(s)
The analysis, design, and implementation of information systems 2nd ed.
Author: Lucas, Henry C.; | Call Number: 004 Luc a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The analysis, design and implemnetation of information systems 3rd ed.
Author: Lucas, Henry C.; | Call Number: 004 Luc a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information systems analysis: with an introduction to fourth-generation technologies
Author: Hall, Vicki J.; | Call Number: 658.403 2 Hal i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Bimasena enterprise integrated information system analysis and design
Author: Franky; Hadyan Andika; Ryan Loanda; Satriadi; Siti Prameswari Wulandari; | Call Number: SP-103 (Softkopi SP-40 - rusak ) Source code SP-20 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next