pasar.pts-ptn.net
17 Hours Information Services
Tel/Fax : 021-8762002, 8762003, 8762004, 87912360
Mobile/SMS : 081 1110 4824 27, 0812 9526 2009, 08523 1234 000, 0815 145 78119
WhatsApp : 0817 0816 486, 0812 9526 2009, 0815 145 78119
email : _ Contact Us _ _ please click
Comparison of disk encryption software This is a technical feature comparison of different disk encryption software .
Background information Operating systems Features ArchiCrypt Live Yes[ 36] No No Yes[ 36] [ 37] No No No ? Yes[ 36] [ 38] BestCrypt Yes Yes No Yes[ 39] Yes Yes Yes Any supported by OS Yes[ 40] BitArmor DataControlNo Yes No Yes Yes No No NTFS, FAT32 on non-system volumes No BitLocker Drive Encryption No Yes[ 41] Yes[ 42] Yes[ 43] Yes[ 44] Yes Yes[ 43] Chiefly NTFS [ Note 1] Yes [ Note 2] Bloombase Keyparc No No Yes Yes Yes Yes No ? ? CGD No No Yes[ 45] Yes[ 46] Yes[ 45] No No Any supported by OS Yes[ 45] CenterTools DriveLock No Yes No No Yes No No Any supported by OS Yes Check Point Full Disk Encryption ? Yes Yes Yes Yes ? ? ? Yes Conjurers Encrypter ? No ? Yes Yes No No Any supported by OS ? CrossCrypt No No No No No No No ? No CryptArchiver No No No No ? No No ? ? cryptoloop No Yes[ 47] Yes No No Yes[citation needed ] No Any supported by OS ? DiskCryptor No Yes Yes No Yes Yes[ 48] No Any supported by OS Yes[ 48] DISK Protect ? Yes[ 49] ? Yes[ 49] ? ? No ? ? cryptsetup /dmsetup No Yes[ 47] Yes No No Yes No Any supported by OS No dm-crypt /LUKS No Yes[ 47] Yes Yes Yes Yes Partial[ 50] [ Note 3] Any supported by OS Yes DriveCrypt Yes[ 51] Yes No Yes Yes No No ? Yes DriveSentry GoAnywhere 2No No Yes No Yes No ? Any supported by OS Yes E4M No No No No ? No No ? No e-Capsule Private Safe Yes[ 52] No No Yes[ 52] No Yes No ? ? eCryptfs No No Yes Yes Yes Yes Yes Yes[ 53] Yes FileVault No No No Two passwords[ 54] Yes[ 54] ? No HFS+, possibly others No FileVault 2 No Yes No Yes Yes Yes[ 55] No HFS+, possibly others No FREE CompuSec No Yes No No No No No Any supported by OS No FreeOTFE Yes No Yes[ 56] Yes[ 57] Yes No No Any supported by OS Yes GBDE No No[ 58] Yes Yes[ 59] No[ 59] No[ 58] No Any supported by OS Yes GELI No Yes[ 58] Yes Yes[ 60] Yes[ 60] Yes[ 58] No Any supported by OS Yes GuardianEdge Hard Disk Encryption No Yes Yes Yes Yes No No NTFS, FAT32 Yes loop-AES No Yes[ 61] Yes[ 61] Yes[ 61] Yes[ 61] Yes[ 61] No Any supported by OS Yes[ 62] McAfee Endpoint Encryption (SafeBoot) Yes Yes Yes Yes Yes Yes[ 63] [ 64]
Yes Any supported by OS Yes n-Crypt Pro No No No No N/A [ 65] No No ? ? PGPDisk No Yes[ 66] ? Yes Yes[ 67] ? Yes ? Yes Private Disk No No No Yes Yes No No Any supported by OS Yes R-Crypto ? No ? ? ? ? ? Any supported by OS ? SafeGuard Easy No Yes No Yes Yes No Yes[ 68] Any supported by OS Yes SafeGuard Enterprise No Yes No Yes Yes No Yes[ 68] Any supported by OS Yes SafeGuard PrivateDisk No N/A No Yes Yes No Yes[ 69] Any supported by OS Yes SafeHouse Professional No No Yes Yes Yes No No Any supported by OS Yes Scramdisk Yes No No No No No No ? Last update to web site 2009-07-02 Scramdisk 4 LinuxYes[ 70] No No No Yes[ 70] No No ext2, ext3, reiserfs, minix, ntfs, vfat/msdos No SecuBox No No No No Yes No No ? No FinallySecure Enterprise (SECUDE) No Yes Yes No Yes No Yes ? Yes SecureDoc No Yes[ 71] Yes Yes Yes Yes Yes ? Yes Sentry 2020 No No No No No No No ? No softraid / RAID C No No ? ? ? Yes ? Any supported by OS ? svnd / vnconfig No No No No Yes[ 72] Yes ? Any supported by OS ? Symantec Endpoint EncryptionNo Yes Yes Yes Yes No No NTFS, FAT32 Yes TrueCrypt Yes (limited to one per "outer" container) only on Windows[ 73] No yes with multiple keyfiles[ 74] [ 75] Yes Yes No Any supported by OS Yes Aloaha Secure StickYes No Yes Yes No No No NTFS, FAT32 Yes Name Hidden containers Pre-boot authentication Custom authentication Multiple keys Passphrase strengthening Hardware acceleration TPM Filesystems Two-factor authentication
^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authentication ^ An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input Layering Whole disk : Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to "pre-boot authentication" in the features comparison table.Partition : Whether individual disk partitions can be encrypted.File : Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices ).Swap space : Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.Hibernation file : Whether the hibernation file is encrypted (if hibernation is supported).ArchiCrypt Live Yes (except for the boot volume) Yes Yes No No BestCrypt Yes Yes Yes Yes Yes[ 79] BitArmor DataControlNo Yes No Yes Yes BitLocker Drive Encryption Yes (except for the boot volume) Yes No Yes (parent volume is encrypted) Yes (parent volume is encrypted) Bloombase Keyparc Yes Yes Yes Yes No CenterTools DriveLock Yes Yes Yes Yes Yes CGD Yes Yes Yes[ 45] Yes No Check Point Full Disk Encryption Yes Yes ? Yes Yes Conjurers Encrypter No Yes Yes No No CrossCrypt No No Yes No No CryptArchiver No No Yes No No cryptoloop Yes Yes Yes Yes No DiskCryptor Yes Yes No Yes Yes dm-crypt Yes Yes Yes[ 80] Yes Yes[ 81] DriveCrypt Yes Yes[ 51] Yes[ 51] No No DriveSentry GoAnywhere 2No Yes Yes No No E4M No Yes Yes No No e-Capsule Private Safe No No Yes[ 82] No No eCryptfs No No Yes No No FileVault No No Yes[ 54] Yes[ 83] [ 54] Yes[ 83] [ 84] FileVault 2 No Yes[ 55] No Yes Yes FREE CompuSec Yes No Yes Yes Yes FreeOTFE Yes (except for the boot volume) Yes Yes No No GBDE Yes Yes Yes[ 85] Yes No GELI Yes Yes Yes[ 85] Yes No GuardianEdge Hard Disk Encryption Yes Yes Yes Yes Yes loop-AES Yes Yes[ 61] Yes[ 61] Yes[ 61] Yes[ 61] McAfee Endpoint Encryption (SafeBoot) Yes Yes Yes Yes Yes[ 86] n-Crypt Pro Yes Yes Yes No No PGPDisk Yes Yes Yes Yes only on Windows Private Disk No No Yes No No R-Crypto No No Yes No No SafeGuard Easy Yes Yes extra module Yes Each sector on disk is encrypted SafeGuard Enterprise Yes Yes Yes Yes Each sector on disk is encrypted SafeGuard PrivateDisk No No Yes No No SafeHouse Professional No No Yes No No Scramdisk No Yes Yes No No Scramdisk 4 LinuxYes Yes Yes Yes No SecuBox No No Yes N/A No FinallySecure Enterprise (SECUDE) Yes Yes Yes Yes Yes SecureDoc Yes[ 71] Yes Yes Yes Yes Sentry 2020 No No Yes No No softraid / RAID C Yes Yes No Yes (encrypted by default in OpenBSD)[ 87] No svnd / vnconfig ? Yes Yes Yes (encrypted by default in OpenBSD) ? SpyProof! No Yes Yes No No Symantec Endpoint EncryptionYes Yes Yes Yes Yes TrueCrypt Yes[ 88] Yes Yes Yes only on Windows[ 73] Aloaha Secure StickNo No Yes No No Cryptomill Yes N/A Yes N/A N/A Name Whole disk Partition File Swap space Hibernation file
Modes of operation Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
CBC with predictable IVs : The CBC (cipher block chaining ) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks .CBC with secret IVs : The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).CBC with random per-sector keys : The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)LRW : The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[ 89] XTS : XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption. See also Notes and references ^ "Jetico Company Info" . Jetico. http://www.jetico.com/company.htm . Retrieved 2007-01-05 .^ Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk" . mailing list announcement . http://mail-index.netbsd.org/current-users/2002/10/04/0008.html . Retrieved 2007-01-14 . ^ Original release as Protect Data Security Inc.'s "Protect!style="background: #ececec; color: black; font-weight: bold; vertical-align: middle; text-align: left; " class="table-rh"|""Protect guards laptop and desktop data" . http://www.infoworld.com/cgi-bin/displayArchive.pl?/99/25/c05-25.48.htm . Retrieved 2008-09-03 .[dead link ] ^ Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc." . Archived from the original on 2004-08-20. http://web.archive.org/web/20040820174918/www.pointsec.com/news/news.asp?newsid=85 . Retrieved 2008-09-03 . ^ "Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent" . http://www.checkpoint.com/press/2007/protectdataacquisition011107.html . Retrieved 2008-09-03 .^ Sarah Dean (2004-02-10). "OTFEDB entry" . http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 . Retrieved 2008-08-10 . ^ Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html ^ dm-crypt was first included in Linux kernel version 2.6.4: http://lwn.net/Articles/75404/ ^ Clemens Fruhwirth. "LUKS version history" . http://luks.endorphin.org/dm-crypt . Retrieved 2006-12-24 . ^ "archived E4M documentation" . Archived from the original on 2000-05-24. http://web.archive.org/web/20000524061402/www.e4m.net/news.html . ).^ "eCryptfs" . http://ecryptfs.sourceforge.net . Retrieved 2008-04-29 .^ "FreeOTFE version history" . Archived from the original on 2006-12-07. http://web.archive.org/web/20061207224351/http://www.freeotfe.org/docs/version_history.htm#version_history . Retrieved 2006-12-24 .^ "gbde(4) man page in FreeBSD 4.11" . GBDE manual page as it appeared in FreeBSD 4.11 . http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html . Retrieved 2006-12-24 .^ "geli(8) man page in FreeBSD 6.0" . GELI manual page as it first appeared in FreeBSD 6.0 . http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html . Retrieved 2006-12-24 .^ "McAfee Endpoint Encryption" . product description . McAfee. http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html . Retrieved 2009-03-04 .^ "PGP 6.0 Freeware released- any int'l links? ". comp.security.pgp . Web link . Retrieved 2007-01-04 . ^ "Dekart Encryption software timeline" . Dekart. http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline .^ "SafeGuard Easy 4.5 Technical Whitepaper" . Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf . Retrieved 2009-08-10 .^ "SafeGuard Enterprise Technical Whitepaper" . Utimaco. http://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf . Retrieved 2009-08-10 .^ Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide" . Lenovo . ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf . Retrieved 2008-03-05 . ^ "ScramDisk 4 Linux Releases" . http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447 .^ "Sentry 2020 news" . http://www.softwinter.com/ . Retrieved 2007-01-02 .^ OpenBSD 4.2 change notes ^ OpenBSD 2.8 change notes ^ TrueCrypt version history ^ "TrueCrypt License" . http://www.truecrypt.org/legal/license . Retrieved 2012-02-01 .^ [1] PocketPC freeware release- SmartPhone beta available ^ a b c [2] FreeOTFE supports cryptoloop, dm-crypt/cryptsetup /dmsetup , and dm-crypt/LUKS volumes ^ [3] FreeOTFE4PDA supports dm-crypt/LUKS volumes ^ [4] libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes ^ [5] Supports Linux volumes ^ "Endpoint Encryption Datasheet" . McAfee . http://www.mcafee.com/us/enterprise/products/data_protection/data_encryption/endpoint_encryption.html . Retrieved 2010-06-14 .^ [6] Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used ^ [7] Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system ^ [8] Hidden containers description from Jetico (BestCrypt) ^ a b c Secret-containers and Camouflage files ArchiCrypt Live Description ^ Supports "Guest" keys ^ Using "Archicrypt Card" ^ Supported by the BestCrypt container format; see BestCrypt SDK ^ Supported by the BestCrypt Volume Encryption software ^ With PIN or USB key) ^ BitLocker Drive Encryption: Value Add Extensibility Options ^ a b "BitLocker Drive Encryption Technical Overview" . Microsoft . http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true . Retrieved 2008-03-13 .^ Recovery keys only. ^ a b c d Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD design paper . Retrieved 2006-12-24 . ^ Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD" . interview with Roland Dowdeswell . ONLamp.com. http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 . Retrieved 2006-12-24 . ^ a b c dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted ^ a b "DiskCryptor Features" . http://diskcryptor.net/wiki/Main_Page/en . Retrieved 2010-05-25 .^ a b "DISK Protect 4.2 Data Sheet" (PDF). http://www.becrypt.com/us/downloads/DISK%20Protect%204.2_US.pdf . Retrieved 2008-02-27 .^ "cryptsetup Frequently Asked Questions" . http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions . Retrieved 2012-10-25 .^ a b c "DriveCrypt features" . SecurStar GmbH. http://www.securstar.com/products_drivecrypt.php . Retrieved 2007-01-03 .^ a b "Multi level access with separate access credentials, each enabling a different set of functional or logical operations" . EISST Ltd.. http://www.eisst.com/products/private_safe/compare/ . Retrieved 2007-07-25 .^ uses the lower filesystem (stacking) ^ a b c d e Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). Unlocking FileVault: An Analysis of Apple's disk encryption (PDF). Retrieved 2012-01-03 . ^ a b "Mac OS X 10.7 Lion: the Ars Technica review" . Ars Technica. 2011-07-20. http://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13 . Retrieved 2012-01-03 .^ FreeOTFE has a modular architecture and set of components to allow 3rd party integration ^ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles ^ a b c d "FreeBSD Handbook: Encrypting Disk Partitions" . http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html . Retrieved 2006-12-24 .^ a b c Poul-Henning Kamp . "GBDE - GEOM Based Disk Encryption" (PDF). GBDE design document . Retrieved 2006-12-24 . ^ a b "geli(8) man page in FreeBSD-current" . GELI manual page in current FreeBSD . http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html . Retrieved 2006-12-24 .^ a b c d e f g h i j k Jari Ruusu. "loop-AES README file" . http://loop-aes.sourceforge.net/loop-AES.README . Retrieved 2007-04-23 . ^ Using customization ^ "McAfee Endpoint Encryption" . McAfee. http://www.mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf . Retrieved 2012-07-26 .^ "Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3" . Intel. http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/ . Retrieved 2012-07-26 .^ n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only ^ "PGP Whole Disk Encryption FAQ" . PGP Corporation. http://www.pgp.com/products/wholediskencryption/faq.html . Retrieved 2006-12-24 .^ PGP private keys are always protected by strengthened passphrases ^ a b "Embedded Security: Trusted Platform Module Technology Comes of Age" . Utimaco. http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html . Retrieved 2008-03-04 .^ "ThinkVantage Technologies Deployment Guide" . Lenovo . http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf . Retrieved 2008-03-05 .^ a b For Truecrypt containers ^ a b "SecureDoc Product Information" . WinMagic Inc.. http://www.winmagic.com/solutions/securedoc.html . Retrieved 2008-03-05 .^ optional by using -K OpenBSD Manual Pages: vnconfig(8) ^ a b http://www.truecrypt.org/docs/sys-encryption-supported-os.php ^ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a password when a user forgets it? ) ^ http://www.truecrypt.org/docs/?s=keyfiles ^ http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/ ^ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions ^ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/ ^ Uses proprietary e-Capsule file system not exposed to the OS. ^ a b not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault ^ http://macmarshal.com/images/Documents/mm_wp_102.pdf ^ a b File-based volume encryption is possible when used with mdconfig(8) utility. ^ "Control Break Internation Debuts SafeBoot Version 4.27" . http://www.entrepreneur.com/tradejournals/article/120829729.html . Retrieved 2008-08-12 .^ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes^ yes, but not Windows UEFI-based computers with a GUID partition table (GPT): http://www.truecrypt.org/future ^ LRW_issue ^ Containers created with ArchiCrypt Live version 5 use LRW ^ "New features in BestCrypt version 8" . Jetico. http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm . Retrieved 2007-03-02 .^ "New features in version 2" . Jetico. http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm . Retrieved 2009-03-01 .^ a b Niels Fergusson (August 2006). AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista . Microsoft . Retrieved 2008-02-22 . ^ "man 4 cgd in NetBSD-current" . NetBSD current manual page on CGD . 2006-03-11. http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current . Retrieved 2006-12-24 .^ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: http://lwn.net/Articles/213650/ ^ "OS X Lion: About FileVault 2" . http://support.apple.com/kb/HT4790 . Retrieved 2011-01-03 .^ "Linux/BSD disk encryption comparison" . http://mareichelt.de/pub/notmine/linuxbsd-comparison.html . Retrieved 2006-12-24 .^ For Scramdisk containers ^ For Truecrypt 4 containers ^ For Truecrypt 5 and 6 containers ^ Commit enabling AES XTS ^ Containers created with TrueCrypt versions 1.0 through 4.0 use CBC. ^ Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only. ^ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
External links
Tags: Comparison of disk encryption software, Computer Science, 464, Comparison of disk encryption software This is a technical feature comparison of different disk encryption software, Contents Background information 2 Operating systems 3 Features 4 Layering 5 Modes of operation 6 See also 7 Notes and references 8 External links Background information Encryption Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt, Comparison of disk encryption software, English, Instruction Examples, Tutorials, Reference, Books, Guide pasar, pts-ptn.net
Catalog/Brochure Request (Free via POS) Or send name and Your address via SMS to mobile:08523 1234 000
FREE DOWNLOAD Kelas Karyawan BrochureCombined All Areas of Indonesia ◊ PDF (11,2 MB) ◊ ZIP (8,8 MB) ◊ Image/JPG (36,2 MB) Kelas Karyawan BrochureJABODETABEK ◊ PDF (5,5 MB) ◊ ZIP (4,4 MB) ◊ Image/JPG (13,2 MB) Kelas Karyawan BrochureJava and Bali ◊ PDF (4,4 MB) ◊ ZIP (3,5 MB) ◊ Image/JPG (14,5 MB) Kelas Karyawan BrochureWest Java ◊ PDF (2,8 MB) ◊ ZIP (2,2 MB) ◊ Image/JPG (7,1 MB) Kelas Karyawan BrochureSULAWESI ◊ PDF (1,9 MB) ◊ ZIP (1,5 MB) ◊ Image/JPG (5,6 MB) Kelas Karyawan BrochureSUMATERA & BATAM ◊ PDF (2,2 MB) ◊ ZIP (1,7 MB) ◊ Image/JPG (6,5 MB) Regular Program Brochure ◊ PDF (4,1 Mb) ◊ ZIP (8,4 Mb) "New Breakthrough" Book Strategies to Increase Revenue PTS, Quality Education & Resources PTS ◊ PDF(6 Mb) ◊ Image/JPG(16 Mb)
New Solution
Strategies Increase
PTS revenue,
PTS Education Quality,
and PTS Resources
Full information, click http://kpt.co.id
Vacancy
PT. Gilland Ganesha
Design Grafis Senior Programmer
PTS-PTS Link PTS Dominant & Accredited S1, S2, D3 Education