Search Result
Save to File
Your search for
48634
returns
5047
document(s)
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi pengelolaan teknologi informasi dan rekomendasi perbaikan proses berdasarkan kerangka kerja cobit 5: studi kasus lembaga ilmu pengetahuan Indonesia
Author: Muhammad Hanif Muslim; | Call Number: KA-1191 (Softcopi KA-1184) MAK KA-837 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan kerangka acuan pengukuran manfaat bisnis TI pada Instansi Pemerintahan Studi Kasus : Departemen Perhubungan
Author: Yerro Haryonti; | Call Number: T-0891 (Softcopy T-0545) | Edition: 2010 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Penyusunan kerangka kerja perencanaan strategis si/ti dengan memerhatikan faktor proses akuisisi dalam bisnis perusahaan: studi kasus akuisisi perusahaan dalam industri yang sama (PT ABC dan PT XYZ)
Author: Avia Riska Syofiani; | Call Number: KA-1311 (Softcopy KA-1305) MAK KA-957 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisa dan Kajian Kebijakan Keamanan, sebuah studi kasus Sistem E-learning pada Universitas BCD
Author: Rony Baskoro Lukito; | Call Number: PA-0058 (Softcopy PA-0058) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
15
16
17
18
19
20
21
22
23
24
Next