Search Result Save to File Save as CSV
Your search for 31025 returns 5401 document(s)
Perancangan kerangka kerja network security operator center: studi kasus Kementerian Luar Negeri
Author: Fitri Wijayanti; | Call Number: KA-1457 (Softcopy KA-1445) MAK KA-1097 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO/IEC 27001:2005 untuk pengelolaan data migas yang di kelola oleh pihak ketiga: studi kasus pusat data dan teknologi informasi energi dan sumber daya mineral
Author: Dian Ikasari; | Call Number: KA-682 (Softcopy KA-680) MAK KA-341 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles and practice of information secuirty: protecting computers from Hackers and lawyers/ Linda Volonino
Author: Volonino, Linda; | Call Number: 005.8 Vol p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next