Search Result Save to File Save as CSV
Your search for 50044 returns 7451 document(s)
Implementasi ulang sistem basis data tanaman obat indonesia dengan arsitektur model-view-controller (MVC) dan YII framework
Author: Mohammad Afour Satria; | Call Number: SK-1295 (Softcopy SK-777) Source code SK-514 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analsiis revenue assurance and fraud management system pada PT. Telekomunikasi seluler
Author: Sarah Aurelia Putri; | Call Number: KP-1848 (Softcopy KP-1410) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi sistem informasi management trainee dan sistem informasi modul sertifikat Departement Pendidikan dan Pelatihan PT. Pupuk Sriwidjaja Palembang
Author: Fitri Purnama Sari; | Call Number: KP-2131 (Softcopy KP-1693 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Sistem Informasi Management Trainee dan Sistem Informasi Modul Sertifikat Departemen Pendidikan dan Pelatihan PT Pupuk Sriwidjaja Palembang
Author: Zahrul Addini; | Call Number: KP-2156 (Softcopy KP-1718) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Software effort estimation and risk analysis a case study, HAL. 1002- 1007
Author: Mala V. Patil; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Designing a tool for IT governance risk compliance: a case study, Hal. 311-316
Author: Dewi Puspasari, M. Kasfu Hammni, Muhammad Sattar, Rein Nusa; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Study on using organizational knowledge to manage outsouring risk knowledge, Hal. 3618-3621
Author: Tong Shi; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Business familiarity as risk mitigation in software development outsourcing contracts, page 531-551
Author: David Gefen, Simon Wyss, and Yossi Lichtenstein | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next