Your search for 35830 returns 1872 document(s) |
Poower Transformer Assessment Adjusted to Tropical Environment and Utility Requirement |
Author: Ninil U.A. Wardani , A. Pharmatrisanti; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
User requirement project monitoring invoice system PT Rekayasa Industri |
Author: Itsna Imroatus Sholihah; | Call Number: Kp-1349 (Softcopy KP-909) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining cookbook modeling data for marketing, risk, and customer relationship management |
Author: Rud, Olivia Parr; | Call Number: 006.33 Rud d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The six mistakes executives make in risk management, page 78 |
Author: Nassim N. Taleb, Daniel G. Goldstein, and Mark W. Spitznagel | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selecting useful features for personal credit risk management, HAL. 913-920 |
Author: Li Shukai and Narendra S. Chaudhari; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing a tool for IT governance risk compliance: a case study, Hal. 311-316 |
Author: Dewi Puspasari, M. Kasfu Hammni, Muhammad Sattar, Rein Nusa; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Computer incident response planning handbook: Executable plans for protecting information at risk |
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study on using organizational knowledge to manage outsouring risk knowledge, Hal. 3618-3621 |
Author: Tong Shi; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Model for Evaluating Customers Lifetime Value in High Risk Markets |
Author: Kaveh Ahmadi; Hamed Taherdoost; Samira Fakhravar; Neda Jalaliyoon; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|