Your search for 26700 returns 3496 document(s) |
Mengukur tingkat severity, vulnerability, risk, trust, dan privacy pada penerapan keamanan sistem informasi : studi kasus PT XYZ |
Author: Anniesa Marshadiany; | Call Number: SK-1034 (Softcopy SK-515) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Algoritma Optimisasi yang memenuhi Differential Privacy pada Neural Networks Sebagai Pencegahan Serangan Membership Inference |
Author: Roan Gylberth; | Call Number: T-1211 (Softcopy T-919) Mak T-021 | Edition: 2018 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis awareness, privacy concern, trust dan risk beliefs terhadap niat dalam menggunakan fintech peer to peer lending di indonesia |
Author: Faizal Nasution; | Call Number: KA-1321 (Softcopi KA-1321) MAK KA-963 | Edition: 2020 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Classification and Evaluation the Privacy Preserving Data Mining Techniques: by using a Data Modification-based Framework (585-592) |
Author: MohammadReza Keyvanpour
Somayyeh Seifi Moradi; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to destop publishing: what you should know before, opening you macintosh software/Jon M. Duff |
Author: Duff, Jon M.; | Call Number: 686.22 Duf i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside Internet Security: What hackers don't want you to know.../Jeff Crume |
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
APL in practice: what you need to know to install and use successful APL systems and Major applications |
Call Number: 005.133 Apl | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Business of software: what every manager, programmer, and enterpreneur, must know to thrive and survive in good times and bad |
Author: Cusumano, Michael A.; | Call Number: 005.306 8 Cus b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What happened in CLEF 2007 (LNCS-Lecture Notes in Computer Science 5152), Hal. 1-12 |
Author: Carol Peters; | Call Number: 025.04 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Foundations for designing user-centered systems: what system designers need to know about people |
Author: Ritter, Frank E.; | Call Number: 004.019 Rit f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|