Your search for 44589 returns 1916 document(s) |
The One-Minute Risk Assesment Tool |
Author: Amrit Tiwana, [ et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing Risk In Enterprise Systems Implementations |
Author: Judy E. Scott, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Technoscientific risk and relexcitivity of modernity, Hal. 3630-3632 |
Author: Li Hu; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing software quality and business risk |
Author: Ould, Martyn; | Call Number: 005.1 Oul s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security risk analysis/Thomas R. |
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk Management Decision Making (50) |
Author: Rabihah Md.Sum; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT Value proposition in IT strategy maps |
Author: WIbowo, Arrianto Mukti | Call Number: Pub.Staf PN-0030 | Type: Prosiding Nasional
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Science Technology Human Value |
Call Number: [8 (1983): 1-4, 9 (19830: 1-4, 10 (1985): 1-4, 11 (1986): 1-3, 13 (1988): 3-4 (1989): 1-3, 10 (1994): 5-6] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluating Top-k Queries Over Web-Accessible Databases, page 319-362 |
Author: A. Marian, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A formal process for evaluating cots software products, page 58 |
Author: Patricia K.L. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|