Search Result
Save to File
Your search for
32059
returns
161
document(s)
Perancangan ulang dan implementasi sistem identity risk assessment (IndeRA) untuk risk management pada PT. Telekomunikasi Selular/ Wisnu Adiarso Indrasworo
Author: Wisnu Adiarso Indrasworo; | Call Number: KP-0260 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Skema IBE (Identity-Based Encryption Sakai-Kashara menggunakan tate pairing dan iplementasinya
Author: Anthony; | Call Number: SK-1501 (Softcopy SK-983) | Edition: Lim Yohanes Stefanus | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan arsitektur identity and access management menggunakan microservices design process: studi kasus PT Astra international, tbk
Author: Bernardus Bastian Sulistiyo; | Call Number: KA-1310 (Softcopy KA-1304) MAK KA-956 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengujian Implementasi Solusi Customer Identity and Access Management oleh PT Deloitte Konsultan Indonesia untuk Pengguna Aplikasi PT X
Author: Winda Wijaya; | Call Number: KP-3102 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Eksplorasi Penggunaan AI pada Sistem Load Balancing dan Penggunaan FreeIPA sebagai Centralized Identity Management System di GDP Labs
Author: Muhammad Ardivan Satrio Nugroho; | Call Number: KP-3308 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan modul sinkronisasi dalam aplikasi identity management pada windows active directory dan sap software PT. Serasi Autoraya-Divisi Developer
Author: Rachmad Akbar; | Call Number: KP-1624 (Softcopy KP-1186) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Trust Negotiation Policy With The E-Commerce In Business Electronic Identity Management In Indonesia (C-75 -- C-80)
Author: Herlino nanag; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135)
Author: FENG Tao JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149)
Author: Pramukh R. Karla Sang C.sUh Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Programming Languages: Algorithms for Computing the Static Single Assignment Form
Author: G. Bilardi, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next