Search Result Save to File Save as CSV
Your search for 43721 returns 2368 document(s)
Business Intelligence: ETL, Data Visualization, Business Automation, and Fraud Analysis
Author: Duhazultan Syah Alam Bareno; | Call Number: KP-2331 (Softcopy KP-1893) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Analsiis revenue assurance and fraud management system pada PT. Telekomunikasi seluler
Author: Sarah Aurelia Putri; | Call Number: KP-1848 (Softcopy KP-1410) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Penerapan DevOps Dalam Rangka Pencegahan Fraud: Studi Kasus PT XYZ
Author: Adi Hartanto; | Call Number: KA-1765 (Softcopy KA-1756) MAK KA-1401 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security alert, page 104
Author: George K. Campbell | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Database security integrity
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next