Published: Jan 30, 2022

SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

1-4 Fahmi Basya, Mardi Hardjanto , Ikbal Permana Putra
PDF
Read Statistic: 333

Application Of Recapitulation And Staff Performance Assessment Using Standard Working Method

5-10 Agustia Hananto, Eko Pramono, Baenil Huda
PDF
Read Statistic: 294

Design of Customer Satisfaction Application at BCA Kcp Rengasdengklok Using C.45 Algorithm Method

11-16 April Lia Hananto, Shofa Sofiah Hilabi, Detrie Noviani
PDF
Read Statistic: 282

Web-based public complaints information system for Subang City

17-21 Emy Lenora Tatuhey, Tukino, Irpan Hilmi
PDF
Read Statistic: 301

Sales System Using Apriori Algorithm to Analyze Consumer Purchase Patterns

22-27 Elfina Novalia, Apriade Voutama, Syahri Susanto
PDF
Read Statistic: 323

Money Check Result Data Management Application Section Verbasar By Web-Based (Case Study : Perum Peruri)

28-34 Topan Setiawan, Nono Heryana, Bayu Priyatna
PDF
Read Statistic: 279