Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7572 dokumen yang sesuai dengan query
cover
Caeilli, William
New York: Macmillan, 1991
658.4 CAE i
Buku Teks  Universitas Indonesia Library
cover
"The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more."
Waltham, MA: Morgan Kaufmann, 2013
e20426927
eBooks  Universitas Indonesia Library
cover
Washington, D.C.: U.S. Department of Health Human Services, 1988
362 SOC
Buku Teks  Universitas Indonesia Library
cover
Northampton: Elgar, 2018
306 HAN
Buku Teks  Universitas Indonesia Library
cover
Boca Raton: CRC Press, Taylor & Francis Group, 2008
R 363.32 HOM
Buku Referensi  Universitas Indonesia Library
cover
Slater, Ken
New York: Stockton Press, 1991
005.8 SLA i
Buku Teks  Universitas Indonesia Library
cover
Cohen, Frederick B.
New York: John Wiley & Sons, 1995
005.8 COH p
Buku Teks  Universitas Indonesia Library
cover
Calder, Alan
London: kogan page limited, 2005
005.8 CAL b (1)
Buku Teks  Universitas Indonesia Library
cover
Hershey: IRM Press, 2005
303.483 Inf
Buku Teks  Universitas Indonesia Library
cover
Peltier, Thomas
"Abstract:
"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis""
Boca Raton [Florida]: CRC Press, 2014
005.8 PEL i
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>