Search Result Save to File Save as CSV
Your search for 4956 returns 1343 document(s)
Evaluasi dan Penilaian Risiko Keamanan Informasi Menggunakan ISO/IEC 27001: Studi Kasus PT XYZ
Author: Dayyan Fatih; | Call Number: KA-1766 (Softcopy KA-1757) MAK KA-1402 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Risk Assessment Keamanan Informasi Dengan Menggunakan ISO/IEC 27001: Studi Kasus PT Dyandra Promosindo
Author: Mahansa Putra; | Call Number: KA-1772 (Softcopy KA-1762) MAK KA-1407 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Tingkat Kesadaran Keamanan Informasi: Studi Kasus Sekretariat Utama Badan XYZ
Author: Canny Siska Georgina; | Call Number: KA-1773 (Softcopy KA-1763) MAK KA-1408 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian Kesadaran Pegawai Terhadap Keamanan Informasi: Studi Kasus Badan, Meteorologi, Klimatologi, dan Geofisika
Author: Aji Prasetyo; | Call Number: KA-1775 (Softcopy KA-1765) MAK KA-1410 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Manajemen Keamanan Informasi Sistem Pemerintahan Berbasis Elektronik Menggunakan Peraturan Badan Siber dan Sandi Negara Nomor 4 Tahun 2021 dan ISO/IEC 27001:2022: Studi Kasus Pusat Penelitian, Data dan Informasi Badan Narkotika Nasional
Author: Wiwin Nur'aini; | Call Number: KA-1795 (Softcopy KA-1783) MAK KA-1428 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi Peningkatan Keamanan Informasi pada Pusat Sistem Informasi dan Teknologi Keuangan
Author: Achmad Farid Rusdi; | Call Number: KA-1784 (Softcopy KA-1773) MAK KA-1418 | Edition: 2024 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan kebijakan keamanan TI untuk layanan data center di PT X
Author: Rekiardi; | Call Number: T-0410 (Softcopy Scan T-0017) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next