Search Result Save to File Save as CSV
Your search for 27889 returns 3699 document(s)
Perancangan Kapabilitas Security Operations Center (SOC): Studi Kasus PT XYZ
Author: Muhammad Firzi Nabil; | Call Number: KA-1732 (Softcopy KA-1723) MAK KA-1369 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan security operation center (SOC): studi kasus PT XYZ
Author: Kristiadi Himawan; | Call Number: KA-1069 (Softcopy KA-1065) MAK KA-714 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Dokumentasi Website Security Testing Terkait OWASP Top 10 Vulnerabilities
Author: Yunika Winarni; | Call Number: KP-2338 (Sofcopy KP-1900) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis dan pengembangan sistem tata kelola perangkat OMS (Operational Monitoring Security)
Author: Via Setya Hanggatra; | Call Number: KP-2322 (Softcopy KP-1884) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Penyempurnaan security metrics dan evaluasi sistem keamanan informasidi PTPWC indonesia
Author: Emmanuella Hartono; | Call Number: KP-1984 (Softcopy KP-1546) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Konfigurasi network monitoring & security system PT Telekomunikasi Indonesia, Tbk.
Author: A. Fakhrul Arrozi; | Call Number: KP-1135 (Softkopi KP-698) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Critical Success Factor of Security Maturity Model Implementation: A Systematic Literature Review
Author: Tashia Indah Nastiti; Setiadi YAzid; | Call Number: Mak T Jilid 071-095 (T-1284) (Mak T-083) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Antecedent Factors of Information Security Behavior in Health Care Context: A Systematic Review
Author: Puspita Kencana Sari; | Call Number: TR-CSUI/ 001-2020 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Comparison between RSA Hardware and Software Implementation for WSNs security Schemes (E84-E89)
Author: Abdullah said Alkalbani Teddy Mantoro Abu Osman Md Tap; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Flexible Database Security System Using Multiple Access (876-885)
Author: Min-A Jeong Jung-ja Kim Yonggwan Won; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   20 21 22 23 24 25 26 27 28 29  Next