Search Result Save to File Save as CSV
Your search for 42884 returns 5206 document(s)
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Eksplorasi Sniff Terhadap Jaringan Komputer Untuk Keamanan Data Dan Informasi
Author: Doddy Ferdiansyah , Sali Alas M; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan strategis pusat penanganan insiden keamanan informasi Pemerintah
Author: Ahmad Budi Setiawan; | Call Number: KA-368 (Softcopy KA-367) MAK KA-030 | Edition: 2013 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Pemrograman Java Untuk Alert Instrucsion Detection System
Author: Fadhila Nisya Tanjung, Muhammad Irwan Padli Nasution; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengukuran kesadaran keamanan informasi pegawai dan penentuan prioritas program kesadaran dengan mengintegrasikan analytic hierarchy process dan quality function deployment: studi kasus KEMLU RI
Author: Yudhistira Normandia; | Call Number: KA-915 (Softcopy KA-913) MAK KA-572 | Edition: 2017 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pembuatan prototipe pengamanan data rahasia berbasis kriptigrafi beserta dokumen analisa keamanan kriptografi Direktorat Teknologi Informasi Bank Indonesia
Author: Muhammad Hafiz M.; | Call Number: KP-1177 (Softkopi KP-740) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Web security: a step-by step reference guide/Lincon D. Stein
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Kerangka Kerja Pengukuran kesiapan strategis Sistem Informasi sebagai Aset Intangible dengan metode balanced Information Economics Scorecard: Studi kasus di TDM
Author: Ari Kurniawan; | Call Number: T-0539 (Softcopy T-0203) | Edition: 2006 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next