Search Result Save to File Save as CSV
Your search for 52223 returns 2550 document(s)
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud (115-118)
Author: Y.S. Park C.S. Choi C. Jang D.G. Shin G.C. Cho Hwa Soo Kim; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Studi model organisasi CSITs (Computer Security Incident Response TEAMS) pada perusahaan berskala besar, HAL. C.61-C.65
Author: Riza Kurniawan, Budi Rahardjo; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Private Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cryptography, Universitas Indonesia)
Author: Gregorius Aprisunnea; | Call Number: KP-3382 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia)
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Development of mobile self-monitoring tool prototype based on user-centered design
Author: Muhammad Luqman Hakim; | Call Number: SK-1606 (Softcopy SK-1088) | Edition: Harry Budi Santoso | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Training development guidelines (TDG)/
Call Number: 658.312 4 Tra | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Phase of the process of training development
Call Number: 658.312 4 Pha | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-dimensional approach for national cyber security framework
Author: Farisya Setiadi; | Call Number: Ringdis-076 | Type: Ringkasan Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next