Search Result
Save to File
Your search for
6809
returns
5900
document(s)
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Virtual private network dongle based: securing privacy in-eworking, HAL. 433-437
Author: Mora Hertanto Ritonga; Kholif Faiz; Lembaga Sandi Negara; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Building linux and open BSD firewalls/Wes Sonnenreich; Tom Yates
Author: Sonnenreich, Wes; | Call Number: 005.8 Son b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital watermarking and steganography
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Elliptic curves in cryptography
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security analysis of credit card fraud detection and prevention Techniques in intenet banking, HAL. 1062-1072
Author: Sushila Madan; Geetanjali Sah; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
14
15
16
17
18
19
20
21
22
23
Next