Search Result Save to File Save as CSV
Your search for 8948 returns 1556 document(s)
PENGARUH PELAKSANAAN PROGRAM PERIKLANAN MELALUI INTERNET DAN PEMASARAN MELALUI E-MAIL TERHADAP PEMPROSESAN INFORMASI PERIKLANAN SERTA IMPLIKASINYA TERHADAP KEPUTUSAN PEMBELIAN PADA PT. SAN MIGUEL INDONESIA DI WILAYAH JAKARTA DAN BOGOR
Author: Mujiana, Sahni Damerianata; | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perbaikan kinerja manajemen layanan e-mail dengan menggunakan metode sistem manajemen mutu LEAN SIX SIGMA dan Balanced Scorecard :studi kasus PT. XYZ
Author: Nungky Awang Chandra; | Call Number: T-0790 (Softcopy T-0445 | Edition: 2009 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Private Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cryptography, Universitas Indonesia)
Author: Gregorius Aprisunnea; | Call Number: KP-3382 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia)
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying Security Protocols with Brutus, page 443-487
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security and Privacy Issues of Handheld and Wearable Wireless Devices
Author: Roberto Di Pietro, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next