Your search for 35754 returns 4411 document(s) |
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072 |
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemodelan deteksi fraud pada transaksi ATM: studi kasus PT Bank XYZ |
Author: Noperida Damanik; | Call Number: KA-1418 (Softcopi KA-1409) MAK KA-1060 | Edition: 2021 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Telecommunication fraud di Indonesia : kajian masalah dan kebijakan penanganannya, Hal. 165-168 |
Author: Xerandy ST.; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemanfaatan computer forensic pada kegiatan fraud risk management: studi kasus instansi pemerintah XYZ |
Author: Andri Rivano; | Call Number: KA-733 (Softcopi KA-731) MAK KA-390 | Edition: 2015 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Architecture Design, Development & Operations |
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhigway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas |
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|