Your search for 4956 returns 1343 document(s) |
Evaluasi dan Penilaian Risiko Keamanan Informasi Menggunakan ISO/IEC 27001: Studi Kasus PT XYZ |
Author: Dayyan Fatih; | Call Number: KA-1766 (Softcopy KA-1757) MAK KA-1402 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk Assessment Keamanan Informasi Dengan Menggunakan ISO/IEC 27001: Studi Kasus PT Dyandra Promosindo |
Author: Mahansa Putra; | Call Number: KA-1772 (Softcopy KA-1762) MAK KA-1407 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluasi Tingkat Kesadaran Keamanan Informasi: Studi Kasus Sekretariat Utama Badan XYZ |
Author: Canny Siska Georgina; | Call Number: KA-1773 (Softcopy KA-1763) MAK KA-1408 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kajian Kesadaran Pegawai Terhadap Keamanan Informasi: Studi Kasus Badan, Meteorologi, Klimatologi, dan Geofisika |
Author: Aji Prasetyo; | Call Number: KA-1775 (Softcopy KA-1765) MAK KA-1410 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan Manajemen Keamanan Informasi Sistem Pemerintahan Berbasis Elektronik Menggunakan Peraturan Badan Siber dan Sandi Negara Nomor 4 Tahun 2021 dan ISO/IEC 27001:2022: Studi Kasus Pusat Penelitian, Data dan Informasi Badan Narkotika Nasional |
Author: Wiwin Nur'aini; | Call Number: KA-1795 (Softcopy KA-1783) MAK KA-1428 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategi Peningkatan Keamanan Informasi pada Pusat Sistem Informasi dan Teknologi Keuangan |
Author: Achmad Farid Rusdi; | Call Number: KA-1784 (Softcopy KA-1773) MAK KA-1418 | Edition: 2024 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan kebijakan keamanan TI untuk layanan data center di PT X |
Author: Rekiardi; | Call Number: T-0410 (Softcopy Scan T-0017) | Edition: 2003 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|