Your search for 53654 returns 1235 document(s) |
Selecting useful features for personal credit risk management, HAL. 913-920 |
Author: Li Shukai and Narendra S. Chaudhari; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing a tool for IT governance risk compliance: a case study, Hal. 311-316 |
Author: Dewi Puspasari, M. Kasfu Hammni, Muhammad Sattar, Rein Nusa; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Computer incident response planning handbook: Executable plans for protecting information at risk |
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study on using organizational knowledge to manage outsouring risk knowledge, Hal. 3618-3621 |
Author: Tong Shi; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The modern enterprise financial risk management in process of debt financing, Hal. 3683-3685 |
Author: Hongxing Tu; Xu Xiao; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business familiarity as risk mitigation in software development outsourcing contracts, page 531-551 |
Author: David Gefen, Simon Wyss, and Yossi Lichtenstein | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Model for Evaluating Customers Lifetime Value in High Risk Markets |
Author: Kaveh Ahmadi; Hamed Taherdoost; Samira Fakhravar; Neda Jalaliyoon; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perbaikan dan pengembangan modul risk monitoring online (RMOL) berbasis linux |
Author: Fitria Agustina; | Call Number: KP-0235 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk management/ I.C. Palmer; G.A. Potter |
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber |
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|