[1]
|
ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA
|
|
2019 |
|
|
[2]
|
Review of Information Security Policy based on Content Coverage and Online Presentation in Higher Education
|
|
2018 |
|
|
[3]
|
'Review of information security policy based on content coverage and online presentation in higher education
|
|
2018 |
|
|
[4]
|
Examining the relationship of business operations and the information security culture in the United States
|
|
2017 |
|
|
[5]
|
Application of Six Sigma Tools for Improvement of Information Security Management System
|
|
2017 |
|
|
[6]
|
ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA PADA …
|
|
2017 |
|
|
[7]
|
ANALISIS PERBAIKAN KAPABILITAS PROSES UNTUK MINIMASI CACAT PRODUK CAT JENIS 407 1KG DENGAN PENDEKATAN LEAN SIGMA PADA PT …
|
|
2017 |
|
|
[8]
|
Melhores práticas do COBIT, ITlL e ISO/IEC 27002 para implantação de política de segurança da informação em Instituições Federais do Ensino Superior
|
|
2017 |
|
|
[9]
|
A generic framework for information security policy development
|
|
2017 |
|
|
[10]
|
On the Cost of Cyber Security in Smart Business
|
|
2017 |
|
|
[11]
|
Information security policy development and implementation: The what, how and who
|
|
Computers & Security,
2016 |
|
|
[12]
|
TRAINING USERS TO BE AWARE OF COMPUTER AND INFORMATION SECURITY ON COLLEGE AND UNIVERSITY CAMPUSES.
|
|
Journal of Information Systems Technology & Planning,
2016 |
|
|
[13]
|
SELinux Integrity Instrumentation (SII): Instrumenting SELinux for configuration auditing and integrity monitoring
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[14]
|
Melhores práticas para implantar política de segurança da informação e comunicação em instituições federais de ensino superior
|
|
2016 |
|
|
[15]
|
Cyber security management: a governance, risk and compliance framework
|
|
2016 |
|
|
[16]
|
Antecedents of employee participation in internal control design and intent to comply with information system security policies
|
|
2015 |
|
|
[17]
|
SELINUX INTEGRITY INSTRUMENTATION (SII): INSTRUMENTING SELINUX FOR CONFIGURATION AUDITING AND INTEGRITY MONITORING.
|
|
2015 |
|
|
[18]
|
E–business, recent threats and security countermeasures
|
|
International Journal of Electronic Security and Digital Forensics,
2014 |
|
|
[19]
|
E-business, recent threats and security countermeasures
|
|
International Journal of Electronic Security and Digital Forensics,
2014 |
|
|
[20]
|
Operational Risk Management for Derivatives Using Wonhyo's Elliptical Orbit Model: Consilience for Lean Six Sigma, Data Security, ISO, Accounting …
|
|
2014 |
|
|
[21]
|
Operational Risk Management for Derivatives Using Wonhyo's Elliptical Orbit Model: Consilience for Lean Six Sigma, Data Security, ISO, Accounting …
|
|
2014 |
|
|
[22]
|
Information Security Policy Development: A Literature
|
|
2014 |
|
|
[23]
|
Exploring information technology security requirements for academic institutions to reduce information security attacks, breaches, and threats
|
|
2014 |
|
|
[24]
|
SCHOOL OF COMPUTING AND INFORMATICS
|
|
Thesis,
2012 |
|
|
[25]
|
Optimizing Rational Decision Making When Reasoning About Enhancing Pki Security for Government: a Quantitative Decision Support Approach
|
|
Thesis,
2012 |
|
|