Search Result Save to File Save as CSV
Your search for 36807 returns 7353 document(s)
Information technology project management 3rd ed (INSTRUCTOR'S MANUAL)
Author: Marchewka, Jack T.; | Call Number: 658.403 8 Mar i | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan kerangka kerja OBRiM (Options- Based Risk Management) dalam upaya memaksimalkan nilai investasi Teknologi Informasi studi kasus :PT. TOA Galindra Electronics
Author: Kennis Kendrasti; | Call Number: T-0841 (Softcopy T-0496) | Edition: 2009 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan arsitektur keamanan cloud untuk sistem uji kompetensi tenaga kesehatan nasional LPUK DIKTI menggunakan NIST cloud-adapted risk management framework
Author: Shanti Andriyanti; | Call Number: KA-609 (softcopy KA-606) | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian literatur keterkaitan tabel manfaat bisnis SI/TI generik dengan manajemen risiko menggunakan COSO enterprise risk management framework
Author: Deni Samuel; | Call Number: KA-567 (Softcopy KA-564) MAK KA-227 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to assembly language program: from 8086 to pentium processor/Sivarama P. Dandamudi
Author: Dandamudi, Sivarama P.; | Call Number: 005.265 Dan i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next