Dzikril Hakim Nur Hisyam, author
Audit kepatuhan keamanan informasi dengan menggunakan framework ISO 27001/ISMS: Studi kasus PT XYZ = Information security compliance audit with ISO 27001/ISMS framework: Case study PT XYZ
Fakultas Ilmu Komputer Universitas Indonesia, 2015
 UI - Tugas Akhir
Thea Nisaa Andi Saffanah, author
Perancangan Kebijakan Keamanan Informasi: Studi Kasus Instansi XYZ = Designing Information security policies, Case study: XYZ Institute
Fakultas Ilmu Komputer Universitas Indonesia, 2022
 UI - Tugas Akhir
Pfleeger, Charles P., 1948-, author
Security in computing
Prentice-Hall, 2015
 Buku Teks
Regina Mutiara Mastiur, author
Penegakan Hak Pengajuan Keberatan terhadap Automated Decision Making dalam Credit Scoring: Studi Komparasi Indonesia dengan Uni Eropa = Enforcement of The Right Not to be Subject to Automated Decision Making towards Credit Scoring: Comparative Study between Indonesia and the European Union
Fakultas Hukum Universitas Indonesia, 2024
 UI - Skripsi Membership
Androulidakis, Iosif I., author
Mobile phone security and forensics: a practical approach
[, Springer], 2012
 eBooks
<<   5 6 7   >>