Search Result
Save to File
Your search for
37561
returns
5948
document(s)
Rancangan keamanan data sistem smartcard kesehatan sesuai kebutuhan di Indonesia/ Christrine Sariasih
Author: Christine Sariasih; | Call Number: SK-0409 | Edition: Lik Wilarso | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Jaringan komputer dengan sistem keamanan internet malalui telekomunikasi wireless LAN, HAL. 22 - 34
Author: Indri Neforawati, Hoga Saragih; | Call Number: SEM-293 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi kinerja sistem manajemen keamanan informasi menggunakan ISO 17799: studi kasus Departemen Pertanian RI
Author: Danan Mursito; | Call Number: PA-0145 (Softcopy PA-0145) | Edition: 2008 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi manajemen risiko untuk sistem manajemen keamanan informasi dengan menggunakan ISO 27001:2005 : studi kasus PT.XYZ
Author: Ressy Dwitias Sari; | Call Number: KA-830 (Softcopy KA-883) MAK KA-487 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi kinerja sistem komputer paralel berbasis pertukaran pesan TransPAU/Budhie Himawan
Author: Himawan, Budhie; | Call Number: SK-0263 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan kebijakan keamanan TI jaringan komputer pada PT X
Author: Hendra Riyadi; | Call Number: T-0380 (Softcopy T-0020) | Edition: 2003 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Meningkatkan Keamanan Komputer Secara Otentikasi Multi Faktor (251-254)
Author: Yani Maulita Ramliana Siregar Ayu Nuriana Sebayang Rosita Dalimunte; | Call Number: SEM-312 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis keamanan jaringan komputer Fakultas Ilmu Komputer UI
Author: Siti Munawaroh; | Call Number: KP-2263 (Softcopy KP-1825) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Tools for Datalog Boundedness (1-12)
Author: Gerd G. Hillebrand Paris C. Kanellakis Herry G.Mairson Moshe Y. Vardi; | Call Number: SEM-350 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi penerapan manajemen keamanan informasi di XPRINS
Author: Mohammad Baihaqi Aqrabaddin; | Call Number: KA-014 (Softcopy KA-014) | Edition: 2010 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next