Search Result Save to File Save as CSV
Your search for 26700 returns 3496 document(s)
Mengukur tingkat severity, vulnerability, risk, trust, dan privacy pada penerapan keamanan sistem informasi : studi kasus PT XYZ
Author: Anniesa Marshadiany; | Call Number: SK-1034 (Softcopy SK-515) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Algoritma Optimisasi yang memenuhi Differential Privacy pada Neural Networks Sebagai Pencegahan Serangan Membership Inference
Author: Roan Gylberth; | Call Number: T-1211 (Softcopy T-919) Mak T-021 | Edition: 2018 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis awareness, privacy concern, trust dan risk beliefs terhadap niat dalam menggunakan fintech peer to peer lending di indonesia
Author: Faizal Nasution; | Call Number: KA-1321 (Softcopi KA-1321) MAK KA-963 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592)
Author: MohammadReza Keyvanpour Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to destop publishing: what you should know before, opening you macintosh software/Jon M. Duff
Author: Duff, Jon M.; | Call Number: 686.22 Duf i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Inside Internet Security: What hackers don't want you to know.../Jeff Crume
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
APL in practice: what you need to know to install and use successful APL systems and Major applications
Call Number: 005.133 Apl | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
The Business of software: what every manager, programmer, and enterpreneur, must know to thrive and survive in good times and bad
Author: Cusumano, Michael A.; | Call Number: 005.306 8 Cus b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
What happened in CLEF 2007 (LNCS-Lecture Notes in Computer Science 5152), Hal. 1-12
Author: Carol Peters; | Call Number: 025.04 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Foundations for designing user-centered systems: what system designers need to know about people
Author: Ritter, Frank E.; | Call Number: 004.019 Rit f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next