Search Result Save to File Save as CSV
Your search for 53116 returns 7439 document(s)
Analisis hubungan kendali keamanan sanksi yang dirasakan, dan kepercayaan moral terhadap intensi penyalahgunaan aplikasi mobile oleh pengendara ojek online
Author: Muhammad Teguh Brillian; | Call Number: KA-1110 (Softcopi KA-1104) MAK KA-756 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan strategi pertahanan vital korporat berbasis ISO 27001/27002 studi kasus kementrian X
Author: Geri Brian Rachmadi; | Call Number: KA-095 (Softcopy KA-095) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan standar desain layanan cloud berdasarkan ISO/IEC 20000: studi kasus PT XYZ
Author: Ahmad Fikri Adriansyah; | Call Number: KA-784 (Softcopy KA-783) MAK KA-441 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Penilaian Risiko Keamanan Informasi Menggunakan ISO/IEC 27005: Studi Kasus Sistem Informasi Kepegawaian PT.XYZ
Author: Mohamad Lutfi Ismail; | Call Number: KA-1628 (Softcopy KA-1614) MAK KA-1265 | Edition: 2022 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Principles and practice of information secuirty: protecting computers from Hackers and lawyers/ Linda Volonino
Author: Volonino, Linda; | Call Number: 005.8 Vol p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Audit keamanan teknologi informasi (IT) dengan menggunakan kerangka pemetaan ISO/IEC 27002 ke cobit 4.1: studi kasus sekretariat direktorat jenderal pendidikan tinggi (DIKTI)
Author: Eva Zakiah; | Call Number: SK-0927 (Softcopy SK-408) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next