Search Result Save to File Save as CSV
Your search for 41816 returns 2331 document(s)
Audit keamanan teknologi informasi (TI) dengan menggunakan control objektive pada kerangka cobit 4.1: studi kasus Fakultas Ilmu Komputer (FASILKOM) Universitas Indonesia
Author: Arnold Rafles Fansius; | Call Number: SK-1085 (Softcopy SK-566) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Identifikasi tingkat keamanan sistem electronic voting dengan menggunakan model electronic voting system security optimization: studi kasus lembaga XYZ
Author: Ratih Malini; | Call Number: SK-1090 (Softcopy SK-571) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Audit keamanan teknologi informasi (IT) dengan menggunakan kerangka pemetaan ISO/IEC 27002 ke cobit 4.1: studi kasus sekretariat direktorat jenderal pendidikan tinggi (DIKTI)
Author: Eva Zakiah; | Call Number: SK-0927 (Softcopy SK-408) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis tingkat kesadaran keamanan informasi pada nasabah kartu kredit menggunakan multiple criteria decision analysis (MCDA): studi kasus Bank XYZ
Author: Aristides Fariz; | Call Number: KA-1343 (Softcopi KA-1336) MAK KA-987 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Manajemen Risiko Keamanan Informasi Menggunakan International Organization for Standardization/international Electrotechnical Commission 27005:2008: Studi Kasus Badan Narkotika Nasional
Author: Hasan Shahab; | Call Number: KA-1669 (Softcopy KA-1654) MAK KA-1305 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penilaian Risiko Keamanan Informasi Menggunakan Metode Octave Allegro: Studi Kasus Aplikasi Layanan Customer Relationship Management Oleh PT XYZ
Author: Berlianto Yusuf; | Call Number: KA-1630 (Softcopy KA-1616) MAK KA-1267 | Edition: 2022 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Weak bisimulation for fully probabilistic processes, (LNCS-Lecture Notes in Computer Science 1254) Hal 119-130
Author: Christel Baier; Holger Hermanns; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A fully digital adaptive power-supply regulator based on improved pulse skip modulation in 90 nm CMOS, 168-173
Author: Hangbiao Li, Ping Luo, Qian Xie, Bo Zhang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis sandi square terhadap Advanced Encryption Standard (AEA), Hal. 499-502
Author: Yusuf Kurniawan, Adang Suwandi A.; M. Sukrisno Mardiyanto; Iping Supriana S.; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next