Search Result
Save to File
Your search for
41816
returns
2331
document(s)
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital color image encryption based on chaotic tent map, 329-331
Author: Songlin He; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Performance Anlysis of the Symmetric Proxy Re-encryption Scheme (91-96)
Author: Rizky Putri meiliasari Amril Syalim Setiadi Yazid; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Image Encryption Technology based on Chaos Theory (V1-632 -- V1-635)
Author: WANG Xiaoman CHU Ying LIU Peng HAN Zhiqiang JING QI WANG Xing LV RuiHua JIANG Xin; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Message Encryption Using Deceptive Text And Randomized Hashing (673-680)
Author: Vamsikrishna Yenikapati B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementasi Green Computing dengan PC Cloning Menggunakan Ncomputing pada Local Area Network (Studi Kasus PT. Ika Utama Transfer Express Medan) (275-284)
Author: Jehezkiel Wowiling Muhammad Taufik BAtubara Leo Agus Fernand; | Call Number: SEM-312 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Integrasi layanan pemerintah berbasis government cloud
Author: Mubarik Ahmad; | Call Number: T-991 (Softcopy T-700) Source code T-144 | Edition: 2012 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Kajian profilisasi dan kuantifikasi aset informasi menggunakan information asset profiling dalam penerapan sistem manajemen keamanan informasi (SMKI) ISO 27001 pada industri rumah sakit: studi kasus Rumah Sakit Pondok Indah
Author: Mohamad Tri Wicaksono; | Call Number: KA-192 (Softcopy KA-191) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Rancangan sistem manajemen keamanan informasi dengan menggunakan kerangka kerja ISO/IEC 27001:2013: studi kasus Pusat informasi dan hubungan masyaratkat Kementerian agama RI
Author: Irfan Sembiring; | Call Number: KA-884 (softcopy KA-882) MAK KA-541 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan manajemen risiko keamanan informasi dengan menggunakan metode NIST 800-30: studi kasus sistem informasi akademik (SIMAK) Universitas Islam Negeri Sultan syarif kasim Riau
Author: Wenni Syafitri; | Call Number: KA-507 (Softcopy KA-504) MAK KA-167 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next