Bacik, Sandy, author
Building an effective information security policy architecture
CRC Press, Taylor & Francis Group, 2008
 Buku Teks
Tasevski, Predrag, author
Interactive Cyber Security Awareness Program : Humans coupled with the socio-technical aspect can be either the strongest or the weakest link in any IT security
Lap Lambert Academic Publishing , 2012
 Buku Teks
Abi Jam An Kurnia, author
Analisis hukum ketahanan dan keamanan nasional terhadap konglomerasi industri informasi dan komunikasi di Indonesia: studi kasus Google application dan Google loon = Legal analysis of national resilience and security against conglomeration of information and communication industry in Indonesia: case study Google application and Google loon
2017
 UI - Skripsi (Membership)
Cheswick, William R., author
Firewalls and internet security repelling the wily hacker
Addison-Wesley, 1994
 Buku Teks
Revient Noor Ode, author
Evaluasi kinerja protokol routing AODV, AODV-UU, dan AODV dalam mode serangan malicious pada vehicular Ad-hoc network = Performance evaluation of AODV,AODV-UU, and AODV with malicious attack mode on vehicular Ad-hoc network
Fakultas Teknik Universitas Indonesia, 2015
 UI - Tesis (Membership)
<<   3 4 5   >>