Search Result Save to File Save as CSV
Your search for 53116 returns 7439 document(s)
Perancangan proses pengujian regresi terotomatisasi menggunakan software testing standard ISO/IEC 20110 pada proses pengembangan perangkat lunak: studi kasus PT XYZ
Author: Bertha Rotua Marbun; | Call Number: KA-832 (Softcopy KA-829) MAK KA-489 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penyusunan strategi peningkatan kapabilitas pertahanan siber dalam menghadapi serangan siber: studi kasus pusat pertahanan siber Kementerian Pertahanan RI
Author: Soli Agrina Tarigan; | Call Number: KA-1312 (Softcopy KA-1306) MAK KA-958 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan kebijakan keamanan yang efectif dalam menghadapi ancaman internal studi kasus President University
Author: Sasongko Budhi W.; | Call Number: PA-0073 (Softcopy PA-073) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Information technology-automatic identification and data capture techniques-PDF417 bar code symbology specification international standard ISO/IEC 15438 2nd ed. 2006-06-01
Call Number: 004 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian profilisasi dan kuantifikasi aset informasi menggunakan information asset profiling dalam penerapan sistem manajemen keamanan informasi (SMKI) ISO 27001 pada industri rumah sakit: studi kasus Rumah Sakit Pondok Indah
Author: Mohamad Tri Wicaksono; | Call Number: KA-192 (Softcopy KA-191) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan kerangka kerja SNI ISO/IEC 27001: 2009 dan NIST SP 800-53 revisi 4 untuk audit keamanan informasi: studi kasus lembaga pemerintahan XYZ
Author: Herdiansyah Rhamadan; | Call Number: SK-1207 (Softcopy SK-689) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Keamanan komunikasi mobile agent dengan menggunakan Key Encryption Key (KEK) apda symbian OS, HAL. C.19-C.22
Author: Wiwin Suwarningsih; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next