Search Result Save to File Save as CSV
Your search for 40310 returns 524 document(s)
Risk Assessment Keamanan Informasi Dengan Menggunakan ISO/IEC 27001: Studi Kasus PT Dyandra Promosindo
Author: Mahansa Putra; | Call Number: KA-1772 (Softcopy KA-1762) MAK KA-1407 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Tingkat Kesadaran Keamanan Informasi: Studi Kasus Sekretariat Utama Badan XYZ
Author: Canny Siska Georgina; | Call Number: KA-1773 (Softcopy KA-1763) MAK KA-1408 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian Kesadaran Pegawai Terhadap Keamanan Informasi: Studi Kasus Badan, Meteorologi, Klimatologi, dan Geofisika
Author: Aji Prasetyo; | Call Number: KA-1775 (Softcopy KA-1765) MAK KA-1410 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Manajemen Keamanan Informasi Sistem Pemerintahan Berbasis Elektronik Menggunakan Peraturan Badan Siber dan Sandi Negara Nomor 4 Tahun 2021 dan ISO/IEC 27001:2022: Studi Kasus Pusat Penelitian, Data dan Informasi Badan Narkotika Nasional
Author: Wiwin Nur'aini; | Call Number: KA-1795 (Softcopy KA-1783) MAK KA-1428 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi Peningkatan Keamanan Informasi pada Pusat Sistem Informasi dan Teknologi Keuangan
Author: Achmad Farid Rusdi; | Call Number: KA-1784 (Softcopy KA-1773) MAK KA-1418 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Sistem pendistribusian basis data kunci publik PGP dengan memanfaatkan sumber daya record DNS tipe SRV, Hal. 203-2008
Author: Arif Djunaidy; Evy Iryani; | Call Number: SEM-273 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan kebijakan keamanan TI untuk layanan data center di PT X
Author: Rekiardi; | Call Number: T-0410 (Softcopy Scan T-0017) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networking with internet protocols and technology
Author: Stallings William; | Call Number: 004.68 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next