Search Result Save to File Save as CSV
Your search for 31025 returns 5379 document(s)
ISO 27001 complete self-assessment guide: practical tools for self-assessment
Call Number: 005.8 Iso | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Peningkatan Kesadaran Keamanan Informasi Pegawai dengan Pendekatan Knowledge Attitude Behavior (KAB) dan Human Aspects of Information Security Questionnaire (HAIS-Q): Studi Kasus Kementerian Komunikasi dan Informatika
Author: Arif Wahyudi; | Call Number: KA-1714 (Softcopy KA-1705) MAK KA-1351 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi korea membangun information superhighway
Author: Richardus Eko Indrajit | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Inside the information superhighway/ Nicholas Baran
Author: Baran, Nicholas; | Call Number: 004.67 Bar i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corba security : an introduction to safe computing with obejcts/ Bob Bakley
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Kapabilitas Security Operations Center (SOC): Studi Kasus PT XYZ
Author: Muhammad Firzi Nabil; | Call Number: KA-1732 (Softcopy KA-1723) MAK KA-1369 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan security operation center (SOC): studi kasus PT XYZ
Author: Kristiadi Himawan; | Call Number: KA-1069 (Softcopy KA-1065) MAK KA-714 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Inside Internet Security: What hackers don't want you to know.../Jeff Crume
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next