Search Result
Save to File
Your search for
27889
returns
3699
document(s)
Perancangan Kapabilitas Security Operations Center (SOC): Studi Kasus PT XYZ
Author: Muhammad Firzi Nabil; | Call Number: KA-1732 (Softcopy KA-1723) MAK KA-1369 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan security operation center (SOC): studi kasus PT XYZ
Author: Kristiadi Himawan; | Call Number: KA-1069 (Softcopy KA-1065) MAK KA-714 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Dokumentasi Website Security Testing Terkait OWASP Top 10 Vulnerabilities
Author: Yunika Winarni; | Call Number: KP-2338 (Sofcopy KP-1900) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis dan pengembangan sistem tata kelola perangkat OMS (Operational Monitoring Security)
Author: Via Setya Hanggatra; | Call Number: KP-2322 (Softcopy KP-1884) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Penyempurnaan security metrics dan evaluasi sistem keamanan informasidi PTPWC indonesia
Author: Emmanuella Hartono; | Call Number: KP-1984 (Softcopy KP-1546) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Konfigurasi network monitoring & security system PT Telekomunikasi Indonesia, Tbk.
Author: A. Fakhrul Arrozi; | Call Number: KP-1135 (Softkopi KP-698) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical Success Factor of Security Maturity Model Implementation: A Systematic Literature Review
Author: Tashia Indah Nastiti; Setiadi YAzid; | Call Number: Mak T Jilid 071-095 (T-1284) (Mak T-083) | Type: Makalah Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Antecedent Factors of Information Security Behavior in Health Care Context: A Systematic Review
Author: Puspita Kencana Sari; | Call Number: TR-CSUI/ 001-2020 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Comparison between RSA Hardware and Software Implementation for WSNs security Schemes (E84-E89)
Author: Abdullah said Alkalbani Teddy Mantoro Abu Osman Md Tap; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Flexible Database Security System Using Multiple Access (876-885)
Author: Min-A Jeong Jung-ja Kim Yonggwan Won; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
20
21
22
23
24
25
26
27
28
29
Next