Search Result Save to File Save as CSV
Your search for 41816 returns 2331 document(s)
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Digital color image encryption based on chaotic tent map, 329-331
Author: Songlin He; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance Anlysis of the Symmetric Proxy Re-encryption Scheme (91-96)
Author: Rizky Putri meiliasari Amril Syalim Setiadi Yazid; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Image Encryption Technology based on Chaos Theory (V1-632 -- V1-635)
Author: WANG Xiaoman CHU Ying LIU Peng HAN Zhiqiang JING QI WANG Xing LV RuiHua JIANG Xin; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Message Encryption Using Deceptive Text And Randomized Hashing (673-680)
Author: Vamsikrishna Yenikapati B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Green Computing dengan PC Cloning Menggunakan Ncomputing pada Local Area Network (Studi Kasus PT. Ika Utama Transfer Express Medan) (275-284)
Author: Jehezkiel Wowiling Muhammad Taufik BAtubara Leo Agus Fernand; | Call Number: SEM-312 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Integrasi layanan pemerintah berbasis government cloud
Author: Mubarik Ahmad; | Call Number: T-991 (Softcopy T-700) Source code T-144 | Edition: 2012 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian profilisasi dan kuantifikasi aset informasi menggunakan information asset profiling dalam penerapan sistem manajemen keamanan informasi (SMKI) ISO 27001 pada industri rumah sakit: studi kasus Rumah Sakit Pondok Indah
Author: Mohamad Tri Wicaksono; | Call Number: KA-192 (Softcopy KA-191) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan sistem manajemen keamanan informasi dengan menggunakan kerangka kerja ISO/IEC 27001:2013: studi kasus Pusat informasi dan hubungan masyaratkat Kementerian agama RI
Author: Irfan Sembiring; | Call Number: KA-884 (softcopy KA-882) MAK KA-541 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan manajemen risiko keamanan informasi dengan menggunakan metode NIST 800-30: studi kasus sistem informasi akademik (SIMAK) Universitas Islam Negeri Sultan syarif kasim Riau
Author: Wenni Syafitri; | Call Number: KA-507 (Softcopy KA-504) MAK KA-167 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next