Search Result
Save to File
Your search for
35669
returns
2450
document(s)
Analisis dampak implementasi enterprise resource planning (ERP) terhadap manfaat bisnis yang di terima oleh perusahaan badan usaha milik negara (BUMN) tbk dan pt semen indonesia (persero) tbk
Author: Yolanda Trinoverly; | Call Number: KA-1054 (Softcopy KA-1050) MAK KA-790 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis kerangka kesiapan implementasi enterprise resource planning (ERP) pada usaha kecil dan menengah (UKM)
Author: Ria puspadewi natalia yosoenarto; | Call Number: KA-1055 (Softcopy KA-1051) MAK KA-700 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
IWBIS 2019: The 4th International Workshop on Big Data and Information Security
Call Number: SEM-373 | Type: Prosiding Seminar
Find Similar
|
Add To Favorites
|
Detail in New Window
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Software portability: with microcomputer issues
Author: Lecarme, Olivier; | Call Number: 005.1 Lec s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis masalah dan rekomendasi perbaikan implementasi sap erp: studi kasus PT mega eltra
Author: Inas Joesi Burnia; | Call Number: KA-1236 (Softcopi KA-1229) MAK KA-882 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Karakteristik implementasi penjaminan mutu pada proyek pengembangan perangkat lunak berbasis Open Source dan Proprietry
Author: Harry B. Santoso; Dewi Mairiza, R.M. Samik Ibrahim; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Moving towards pci dss 3.0 compliace: a case study of credit card data security audit in an online pyment company
Author: muhammad r sihab; febrianamisdianti; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next