Search Result Save to File Save as CSV
Your search for 35669 returns 2450 document(s)
Analisis dampak implementasi enterprise resource planning (ERP) terhadap manfaat bisnis yang di terima oleh perusahaan badan usaha milik negara (BUMN) tbk dan pt semen indonesia (persero) tbk
Author: Yolanda Trinoverly; | Call Number: KA-1054 (Softcopy KA-1050) MAK KA-790 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis kerangka kesiapan implementasi enterprise resource planning (ERP) pada usaha kecil dan menengah (UKM)
Author: Ria puspadewi natalia yosoenarto; | Call Number: KA-1055 (Softcopy KA-1051) MAK KA-700 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
IWBIS 2019: The 4th International Workshop on Big Data and Information Security
Call Number: SEM-373 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Software portability: with microcomputer issues
Author: Lecarme, Olivier; | Call Number: 005.1 Lec s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis masalah dan rekomendasi perbaikan implementasi sap erp: studi kasus PT mega eltra
Author: Inas Joesi Burnia; | Call Number: KA-1236 (Softcopi KA-1229) MAK KA-882 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Karakteristik implementasi penjaminan mutu pada proyek pengembangan perangkat lunak berbasis Open Source dan Proprietry
Author: Harry B. Santoso; Dewi Mairiza, R.M. Samik Ibrahim; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Moving towards pci dss 3.0 compliace: a case study of credit card data security audit in an online pyment company
Author: muhammad r sihab; febrianamisdianti; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next