Search Result Save to File Save as CSV
Your search for 48634 returns 5046 document(s)
Strategi Peningkatan Keamanan Informasi pada Pusat Sistem Informasi dan Teknologi Keuangan
Author: Achmad Farid Rusdi; | Call Number: KA-1784 (Softcopy KA-1773) MAK KA-1418 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Security Operations Dan Perancangan Security Operations Center : Studi Kasus PT XYZ
Author: Ari Ahmad Syarif; | Call Number: KA-1213 (Softcopi KA-1206) MAK KA-859 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan infrastruktur teknologi informasi adaptif menggunakan kerangka kerja TOGAF ADM: studi kasus Pemerintah Kabupaten Bogor
Author: Bambang Triono; | Call Number: KA-536 (Softcopy KA-533) MAK KA-196 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan kebijakan keamanan TI untuk layanan data center di PT X
Author: Rekiardi; | Call Number: T-0410 (Softcopy Scan T-0017) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: private communication in a public world/Charlie Kaufmann ...[et.al]
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan kerangka kerja adaptif untuk strategi sistem informasi yang agile
Author: I Wayan Widi Pradnyana; | Call Number: KA-216 (Softcopy KA-215) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next