Katalog

jenis keanggotaan anda tidak diperbolehkan men-download dokumen ini
Reset




gunakan subjek dalam bahasa inggris untuk ketepatan hasil pencarian. gunakan karakter % untuk pencarian diperluas
No. Katalog Katalog Subjek Actions
143004 results (page 1/14301)
24.21.592
Buku Saku Dosen dan Perguruan Tinggi Pertukaran Mahasiswa Merdeka
Direktorat Jenderal Pendidikan Tinggi RIset dan Teknologi Kemendikbud Ristek
Direktorat Jenderal Pendidikan Tinggi RIset dan Teknologi Kemendikbud Ristek, 2021
Klasifikasi Higher education, College education, University education, Universities
Buku - Elektronik (E-Book) (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
HIGHER EDUCATION
24.55.042
A logic of authentication
Michael Burrows, Martin Abadi, Roger Needham
ACM Journals, 1990
Klasifikasi Data processing, Computer science
e - Article Journal (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
tersedia 1 file download
COMPUTER SCIENCE
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error..selengkapnya..
24.55.043
Towards A Framework For Trustworthy Data Security Level Agreement In Cloud Procurement
Yudhistira Nugraha, Andrew Martin
Oxford University, 2021
Klasifikasi Data Security
e - Article Journal (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
tersedia 1 file download
COMPUTER SCIENCE
After the post-Snowden upheavals, there is a growing concern about preserving the confidentiality of sensitive data across government agencies when using global cloud service providers, such as Amazon Web Services..selengkapnya..
24.55.044
Obstacles to the Adoption of Secure Communication Tools
Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau
IEEE, 2017
Klasifikasi Data processing, Computer science
e - Article Journal (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
tersedia 1 file download
COMPUTER SCIENCE
—The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools (e.g., Signal,..selengkapnya..
24.12.110
The Economst 18 May 04th-10th 2024
The Economist
The Economist, 2024
Klasifikasi MAJALAH
Majalah - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
ECONOMIC
24.12.111
The Economist 19 May 11Tth17th 2024
The Economist
The Economist, 2024
Klasifikasi MAJALAH
Majalah - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
ECONOMIC
24.12.112
Time 08 May 2024
Time
Time, 2024
Klasifikasi MAJALAH
Majalah - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
SCIENCE
24.12.113
How It Works 90 Issue 190 Until 07/04/2024
How It Works Issue
How It Works Issue, 2024
Klasifikasi MAJALAH
Majalah - Reference (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
SCIENCE
24.12.109
Swa 06 25 April-15 Mei 2024
Swa
SWA, 2024
Klasifikasi MAJALAH
Majalah - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
ECONOMIC
24.55.041
Difference between Management and Leadership: A Case Study
Diana Elrabih
International Journal of Business and Economic Affairs, 2018
Klasifikasi Executive leadership
e - Article Journal (Non-Sirkulasi)
tersedia 0 koleksi
total 1 koleksi
tersedia 1 file download
LEADERSHIP