Search Result Save to File Save as CSV
Your search for 40245 returns 4726 document(s)
Open Erp evaluation with SAP as reference
Author: Nieuwenhuvsen, Christelle Van; | Call Number: 658.401 2 Nie o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
International Journal of Expert Systems Research and Application
Call Number: [24 (1987): 7-12, 3 (1990): 2, 4 (1991): 1-4] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi dan Perbaikan Proses Pengembangan Perangkat Lunak pada LINE Today Application
Author: Pramitya Lisnawaty Ayunda; | Call Number: KA-1385 (Softcopi KA-1378) MAK KA-1029 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO/IEC 27001:2005 untuk pengelolaan data migas yang di kelola oleh pihak ketiga: studi kasus pusat data dan teknologi informasi energi dan sumber daya mineral
Author: Dian Ikasari; | Call Number: KA-682 (Softcopy KA-680) MAK KA-341 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Tinjauan Pustaka Sistematik Deteksi Informasi Palsu dan Kondisinya pada Media Sosial Indonesia
Author: Dwinanda Kinanti SUci Sekarhati; | Call Number: KA-1346 (Softcopi KA-1339) MAK KA-990 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Towards an effective and integrated design for information systems, Hal. 391-395
Author: Kouninef B; Abdi M.K.; Rahmouni M.K.; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to computer systems: analysis, design and application
Author: Aseltine, John A; | Call Number: 004 Ase i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next