Security System, the number of interests, competition and advances in information technology seem to threats and risks should not be separated from an information system. Identify threats to internal and external threats whether intentionally or not, and identification of risk of theft, vandalism (virus) should be serious consideration before embarking on an MIS. In the repair of the system
Sabtu, 06 September 2008
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar