Search Result
Save to File
Your search for
53116
returns
7439
document(s)
Perancangan proses pengujian regresi terotomatisasi menggunakan software testing standard ISO/IEC 20110 pada proses pengembangan perangkat lunak: studi kasus PT XYZ
Author: Bertha Rotua Marbun; | Call Number: KA-832 (Softcopy KA-829) MAK KA-489 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Penyusunan strategi peningkatan kapabilitas pertahanan siber dalam menghadapi serangan siber: studi kasus pusat pertahanan siber Kementerian Pertahanan RI
Author: Soli Agrina Tarigan; | Call Number: KA-1312 (Softcopy KA-1306) MAK KA-958 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan kebijakan keamanan yang efectif dalam menghadapi ancaman internal studi kasus President University
Author: Sasongko Budhi W.; | Call Number: PA-0073 (Softcopy PA-073) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Information technology-automatic identification and data capture techniques-PDF417 bar code symbology specification international standard ISO/IEC 15438 2nd ed. 2006-06-01
Call Number: 004 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Kajian profilisasi dan kuantifikasi aset informasi menggunakan information asset profiling dalam penerapan sistem manajemen keamanan informasi (SMKI) ISO 27001 pada industri rumah sakit: studi kasus Rumah Sakit Pondok Indah
Author: Mohamad Tri Wicaksono; | Call Number: KA-192 (Softcopy KA-191) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Penerapan kerangka kerja SNI ISO/IEC 27001: 2009 dan NIST SP 800-53 revisi 4 untuk audit keamanan informasi: studi kasus lembaga pemerintahan XYZ
Author: Herdiansyah Rhamadan; | Call Number: SK-1207 (Softcopy SK-689) | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Keamanan komunikasi mobile agent dengan menggunakan Key Encryption Key (KEK) apda symbian OS, HAL. C.19-C.22
Author: Wiwin Suwarningsih; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next