Search Result Save to File Save as CSV
Your search for 35754 returns 4411 document(s)
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pemodelan deteksi fraud pada transaksi ATM: studi kasus PT Bank XYZ
Author: Noperida Damanik; | Call Number: KA-1418 (Softcopi KA-1409) MAK KA-1060 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Telecommunication fraud di Indonesia : kajian masalah dan kebijakan penanganannya, Hal. 165-168
Author: Xerandy ST.; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pemanfaatan computer forensic pada kegiatan fraud risk management: studi kasus instansi pemerintah XYZ
Author: Andri Rivano; | Call Number: KA-733 (Softcopi KA-731) MAK KA-390 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Security Architecture Design, Development & Operations
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next