Ditemukan 11 dokumen yang sesuai dengan query
London: McGraw-HIll, 1993
005.8 ERN p
Buku Teks Universitas Indonesia Library
Lobel, Jerome
New York: McGraw-Hill, 1986
005.8 LOB f
Buku Teks Universitas Indonesia Library
Fakultas Ilmu Komputer Universitas Indonesia, 1997
S26989
UI - Skripsi Membership Universitas Indonesia Library
Hruska, Jan, 1957-
New York: Ellis Horwood, 1993
005.8 HRU c
Buku Teks Universitas Indonesia Library
Hartojo Salim
Yogyakarta: Andi, 1993
005.8 HAR v
Buku Teks Universitas Indonesia Library
Fitri Handayani
"
Perubahan dalam industri adalah hal yang tidak dapat dihindari. Segala jenis perubahan dalam industri farmasi termasuk pada Haleon, baik dalam ukuran produksi, kontrol kualitas, kegiatan pergudangan hingga perubahan dalam kontrol akses dan manajemen keamanan password yang digunakan untuk mengakes sistem yang terdapat dalam industri, harus dipertanggung jawabkan melalui sistem manajemen pengendalian perubahan. Tujuan dari penulisan tugas khusus ini adalah mengidentifikasi gambaran manajemen untuk akses kontrol dan manajemen password sistem komputerisasi di PT Sterling Products Indonesia ...
"
Depok: Fakultas Farmasi Universitas Indonesia, 2023
PR-PDF
UI - Tugas Akhir Universitas Indonesia Library
Fisher, Royal P.
Englewood Cliffs, NJ: Prentice-Hall, 1984
658.478 FIS i
Buku Teks Universitas Indonesia Library
Kuong, Javier F.
Englewood Cliffs, NJ: Prentice-Hall, 1987
005.8 KUO c
Buku Teks Universitas Indonesia Library
"
Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.
The basics of digital privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, ...
"
Waltham, MA: Syngress, 2014
e20427744
eBooks Universitas Indonesia Library
Faircloth, Jeremy
"
Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that ...
"
Waltham, Mass: Elsevier, 2011
005.8 FAI p
Buku Teks Universitas Indonesia Library