Search Result Save to File Save as CSV
Your search for 36425 returns 2663 document(s)
Aplikasi pencatatan sistem keamanan ruangan, HAL. 17-22
Author: R. Budiarianto Suryo Kusumo; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
RAPID ENCRYPTION ALGORITHM :SOLUSI KEAMANAN VIDEO CONFERENCE
Author: Khilif Faiz Ma'ruf, MoracH. , Zaenal S.; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Model indentifikasi perancangan keamanan pada E-BUSINESS ( hal. A-18 - A-22 )
Author: Roland Tumbelaka Palar , Bentar Priyopradono , Thepillus J.H. Wellem; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Model indentifikasi perencanaan keamanan pada E-BUSINESS ( hal. A-23 - A-28)
Author: Henny Medyawati Farida, Ega Hegarini; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis keamanan sistem perangkat lunak ( Hal 5 - 10 )
Author: ervin kusuma dewi, azhari SN; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kriptografi, Keamanan Internet dan Jaringan Telekomunikasi/ Kurniawan, Yusuf
Author: Kurniawan, Yusuf; | Call Number: 005.8 Kur k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Keamanan dan autentikasi pada telekonferensi X-Group/ Aneka Sulita
Author: Aneka Sulita; | Call Number: SK-0320 | Edition: Nursalim Hadi | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Penjabaran Teknis dari Kebijakan Keamanan Jaringan Enterprise
Author: Niken Dwi Wahyu Cahyani; | Call Number: T-0478 (Softcopy Scan T-0033) | Edition: 2004 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian Pengembangan Arsitektur Keamanan asean agricultural e-marketplace
Author: ALoysius Johannes Kolibonso; | Call Number: T-0334 (Softcopy T-0067) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan kebijakan keamanan TI jaringan komputer pada PT X
Author: Hendra Riyadi; | Call Number: T-0380 (Softcopy T-0020) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next