Search Result
Save to File
Your search for
36807
returns
7353
document(s)
Information technology project management 3rd ed (INSTRUCTOR'S MANUAL)
Author: Marchewka, Jack T.; | Call Number: 658.403 8 Mar i | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Penerapan kerangka kerja OBRiM (Options- Based Risk Management) dalam upaya memaksimalkan nilai investasi Teknologi Informasi studi kasus :PT. TOA Galindra Electronics
Author: Kennis Kendrasti; | Call Number: T-0841 (Softcopy T-0496) | Edition: 2009 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan arsitektur keamanan cloud untuk sistem uji kompetensi tenaga kesehatan nasional LPUK DIKTI menggunakan NIST cloud-adapted risk management framework
Author: Shanti Andriyanti; | Call Number: KA-609 (softcopy KA-606) | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Kajian literatur keterkaitan tabel manfaat bisnis SI/TI generik dengan manajemen risiko menggunakan COSO enterprise risk management framework
Author: Deni Samuel; | Call Number: KA-567 (Softcopy KA-564) MAK KA-227 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to assembly language program: from 8086 to pentium processor/Sivarama P. Dandamudi
Author: Dandamudi, Sivarama P.; | Call Number: 005.265 Dan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
15
16
17
18
19
20
21
22
23
24
Next