Your search for 25217 returns 2843 document(s) |
The analysis, design, and implementation of information systems 2nd ed. |
Author: Lucas, Henry C.; | Call Number: 004 Luc a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The analysis, design and implemnetation of information systems 3rd ed. |
Author: Lucas, Henry C.; | Call Number: 004 Luc a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information systems analysis: with an introduction to fourth-generation technologies |
Author: Hall, Vicki J.; | Call Number: 658.403 2 Hal i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bimasena enterprise integrated information system analysis and design |
Author: Franky; Hadyan Andika; Ryan Loanda; Satriadi; Siti Prameswari Wulandari; | Call Number: SP-103 (Softkopi SP-40 - rusak ) Source code SP-20 | Type: Student Project (SP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072 |
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440 |
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169 |
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360) |
Author: Junyao Ye
Kening Liu
Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ |
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|