Your search for 50044 returns 7451 document(s) |
Implementasi ulang sistem basis data tanaman obat indonesia dengan arsitektur model-view-controller (MVC) dan YII framework |
Author: Mohammad Afour Satria; | Call Number: SK-1295 (Softcopy SK-777) Source code SK-514 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analsiis revenue assurance and fraud management system pada PT. Telekomunikasi seluler |
Author: Sarah Aurelia Putri; | Call Number: KP-1848 (Softcopy KP-1410) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi sistem informasi management trainee dan sistem informasi modul sertifikat Departement Pendidikan dan Pelatihan PT. Pupuk Sriwidjaja Palembang |
Author: Fitri Purnama Sari; | Call Number: KP-2131 (Softcopy KP-1693 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi Sistem Informasi Management Trainee dan Sistem Informasi Modul Sertifikat Departemen Pendidikan dan Pelatihan PT Pupuk Sriwidjaja Palembang |
Author: Zahrul Addini; | Call Number: KP-2156 (Softcopy KP-1718) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA |
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software effort estimation and risk analysis a case study, HAL. 1002- 1007 |
Author: Mala V. Patil; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing a tool for IT governance risk compliance: a case study, Hal. 311-316 |
Author: Dewi Puspasari, M. Kasfu Hammni, Muhammad Sattar, Rein Nusa; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Computer incident response planning handbook: Executable plans for protecting information at risk |
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study on using organizational knowledge to manage outsouring risk knowledge, Hal. 3618-3621 |
Author: Tong Shi; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business familiarity as risk mitigation in software development outsourcing contracts, page 531-551 |
Author: David Gefen, Simon Wyss, and Yossi Lichtenstein | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|