Search Result
Save to File
Your search for
42884
returns
5206
document(s)
Sistem temu kembali informasi dengan mengimplementasikan indeks frase berbasis sintaksis, sistem peringkat, dan pemrosesan query berbasis frase/ Siti Rohmah
Author: Siti Rohmah; | Call Number: SK-0580 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan strategi pertahanan vital korporat berbasis ISO 27001/27002 studi kasus kementrian X
Author: Geri Brian Rachmadi; | Call Number: KA-095 (Softcopy KA-095) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis tingkat kesadaran pengguna terhadap keamanan informasi di media sosial
Author: Dwi Citra Annisa; | Call Number: KA-1205 (Softcopi KA-1198) MAK KA-851 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi penerapan manajemen keamanan informasi di XPRINS
Author: Mohammad Baihaqi Aqrabaddin; | Call Number: KA-014 (Softcopy KA-014) | Edition: 2010 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Perencanaan Manajemen Risiko Keamanan Informasi : Studi Kasus Teknologi e-Voting Badan Pengkajian dan Penerapan Teknologi (BPPT)
Author: Zulwelly Murti; | Call Number: KA-1211 (Softcopi KA-1204) MAK KA-857 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Penerapan Sistem Keamanan Informasi pada perusahaan bidang teknologi informasi studi kasus: PT XYZ
Author: Andri Darmawan; | Call Number: T-0397 (Softcopy T-0029) | Edition: 2003 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan kebijakan keamanan TI jaringan komputer pada PT X
Author: Hendra Riyadi; | Call Number: T-0380 (Softcopy T-0020) | Edition: 2003 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles and practice of information secuirty: protecting computers from Hackers and lawyers/ Linda Volonino
Author: Volonino, Linda; | Call Number: 005.8 Vol p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next