Search Result Save to File Save as CSV
Your search for 48634 returns 5047 document(s)
Perencanaan Manajemen Risiko Keamanan Informasi : Studi Kasus Teknologi e-Voting Badan Pengkajian dan Penerapan Teknologi (BPPT)
Author: Zulwelly Murti; | Call Number: KA-1211 (Softcopi KA-1204) MAK KA-857 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan infrastruktur kunci publik sebagai upaya meningkatkan jaminan Sekuriti dalam transaksi Online studi kasus PT Telkom Sebagai Certification Authority (CA)
Author: Buana Jaya; | Call Number: T-0305 (Softcopy T-0639) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Unix system security: a guide for users and systems administratiors
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan dan Simulasi Jaringan Berbasis Virtual Local Area Network (VLAN) Menggunakan Cisco Ctalyst (A-101 -- A-109)
Author: Irma Susanti Erna Kumalasari Nurnawati; | Call Number: SEM-310 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan sistem informasi Manajemen Keuangan Pada Perwakilan RI di Luar Negeri
Author: Yuda Djuanda; | Call Number: T-0464 (Softcopy T-0082) | Edition: 2004 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Kerangka Kerja Pengukuran kesiapan strategis Sistem Informasi sebagai Aset Intangible dengan metode balanced Information Economics Scorecard: Studi kasus di TDM
Author: Ari Kurniawan; | Call Number: T-0539 (Softcopy T-0203) | Edition: 2006 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Secure wireles sensor network: solusi efisiensi sistem keamanan ubiquitous sensor network, HAL. 421-426
Author: Kholif Faiz Ma'ruf; Arif Rahman Hakim; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next