Search Result Save to File Save as CSV
Your search for 48634 returns 5047 document(s)
Tingkat Kematangan Dan Rekomendasi Perbaikan Tata Kelola Teknologi Informasi Berdasarkan Kerangka Kerja COBIT 2019: Studi Kasus Mahkamah Agung Republik Indonesia
Author: Rama Alfiandi; | Call Number: KA-1804 (Softcopy KA-1791) MAK KA-1436 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian nilai Ekonomis Pengimplementasian Sistem Prabayar CDMA pada operator Telekomunikasi selular studi kasus PT. KOMSELINDO
Author: Hodoriko L. T.; | Call Number: T-0311 | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan strategis sistem informasi fungsi perdagangan dalam negeri di kementerian perdagangan
Author: Anggi Permata Dewi; | Call Number: KA-1306 (Softcopy KA-1300) MAK KA-952 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Executive guide to preventing information technology disasters/Richard Ennals
Author: Ennals, Richard; | Call Number: 658.478 Enn e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next