Search Result Save to File Save as CSV
Your search for 6809 returns 5900 document(s)
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Virtual private network dongle based: securing privacy in-eworking, HAL. 433-437
Author: Mora Hertanto Ritonga; Kholif Faiz; Lembaga Sandi Negara; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building linux and open BSD firewalls/Wes Sonnenreich; Tom Yates
Author: Sonnenreich, Wes; | Call Number: 005.8 Son b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Digital watermarking and steganography
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Elliptic curves in cryptography
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next