Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7214 dokumen yang sesuai dengan query
cover
Gems, Jonathan
London: A Signet Book, 1996
791.437 2 GEM m
Buku Teks SO  Universitas Indonesia Library
cover
Firsoff, V.A.
Hornchurch, Essex: Ian Henry Publications, 1980
523.43 FIR n
Buku Teks SO  Universitas Indonesia Library
cover
Grego, Peter
"The first part of Mars and how to observe It sets out our current knowledge of Mars as a planet. Its orbit, physical characteristics, evolution over time, and current geology. A planet-wide tour of Mars's topography is featured, along with clearly labeled maps and close-up images of a variety of features. The second part of the book explains how amateur and practical astronomers can observe Mars successfully. Many aspects are considered in depth, including preparing to observe, calculating phase and tilt, and making observational sketches and drawings. There are also plenty of details about how best to make high-resolution CCD images. "
New York: [Springer, ], 2012
e20425260
eBooks  Universitas Indonesia Library
cover
Sparrow, Giles, 1970-
"Mars has always fascinated humanity and the findings of the past decade have revolutionized ideas about our nearest neighbour revealing its watery past and geological similarity to Earth. This giant volume, filled with the latest and most magnificent images to be sent back from Curiosity, will walk you in the footsteps of the NASA probes and rovers that have been surveying the planet from 1964 until the present day. Experience its other-worldly beauty as you hover over sinister dust devils, immense icecaps and textured rock formations. Mars charts an incredible course across this unfamiliar planet, depicting all sides, seasons, channels and chasms, from the North Pole to the Southern Highlands. Witness the soaring heights of Olympus Mons - the tallest volcano in the Solar System - watch a giant dust storm tear through the canyons of the Valles Marineris, and explore the broad valleys of Chryse Planitia, scarred from catastrophic floods. Detailed and accessible essays explain how Mars was formed, shedding light on its internal and external structure, weather systems and unique geographical features, as well as on the compelling evidence of water and microscopic life. Each image is accompanied by a caption that explains in unparalleled detail the abstract patterns and peculiar geology that form this majestic planet. Featuring over 200 spectacular photographs and informative colour diagrams, an atlas of the surface and details of the most recent scientific discoveries, Mars is the perfect introduction to the Red Planet."
London: Quercus, 2014
R 523.430 222 SPA m
Buku Referensi  Universitas Indonesia Library
cover
Tine Munk
"This book outlines the complexity in understanding different forms of cyber attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber attacks, the lack of consistency within regulatory frameworks, and the grey zone that this creates, for cybercriminals to operate within.
Connecting diverse literatures on cyberwarfare, cyberterrorism, and cyberprotests, and categorising the different actors involved – state-sponsored/supported groups, hacktivists, online protestors – this book compares the means and methods used in attacks, the various attackers, and the current strategies employed by cybersecurity agencies. It examines the current legislative framework and proposes ways in which it could be reconstructed, moving beyond the traditional and fragmented definitions used to manage offline violence.
This book is an important contribution to the study of cyber attacks within the areas of criminology, criminal justice, law, and policy. It is a compelling reading for all those engaged in cybercrime, cybersecurity, and digital forensics."
London: Routledge, 2022
e20534422
eBooks  Universitas Indonesia Library
cover
J.M. Seno Adjie
Jakarta: Elex Media Komputindo, 2005
778.59 SEN a
Buku Teks SO  Universitas Indonesia Library
cover
Finch, Christopher
New York: NY The Monacelli Press, 2013
R 777.7 FRE c
Buku Referensi  Universitas Indonesia Library
cover
Daniels, Jonathan
London: Victor Gollancz, , 1951
923 TRU
Buku Teks SO  Universitas Indonesia Library
cover
Stella Gabriella Apriliani
"Pemerintah sedang fokus menangani konten negatif pada internet yang memiliki pengaruh buruk dengan membuat regulasi yang mengikat ISP untuk melakukan filtering konten negatif. Awalnya, para pihak ISP melakukan filtering konten negatif dengan pendekatan teknologi DNS yang database situsnya dikirimkan melalui email oleh Kominfo kepada masing-masing ISP dan hal tersebut dirasa kurang efektif, sehingga pemerintah mengeluarkan metode baru dengan menggunakan fitur DNS-RPZ dimana semua data terpusatkan pada database Kominfo yang diupdate melalui aduan konten negatif TRUST dan disebarluaskan ke masing-masing ISP melalui protokol DNS - RPZ tersebut. Akan tetapi DNS rentan oleh serangan, seperti Distributed Denial of Service DDoS. Oleh karena itu, pada penelitian ini akan ditinjau lebih lanjut tentang cara yang dapat dilakukan untuk menangani adanya serangan pada DNS. Serangan DDoS tersebut dapat dideteksi secara otomatis oleh FastNetMon dan juga dimitigasi oleh ExaBGP dengan melakukan injeksi informasi routing BGP FlowSpec pada router mitigasi.

The government lately has been focusing on handling negative contents on the internet those have bad impacts by establishing regulation that binds ISPs to filter negative contents. Earlier, the ISPs do the filtering with a DNS approach whose database of the site is sent by email by the ministry of communication and information to each ISP, and such method is considered less efficient. Thus, the government has established a new method using the feature of DNS RPZ where all data is centralized to the database of the ministry of communication and information which is updated through TRUST negative content reports and widely spread to each ISP through the DNS RPZ protocol. However, DNS is fragile to attacks, such as Distributed Denial of Service DDoS. Therefore, this research will observe through ways that can be done to handle attacks to DNS. DDoS attacks can be detected automatically by FastNetMon and also mitigated by ExaBGP which injected routing information BGP FlowSpec on the mitigation router."
Depok: Fakultas Teknik Universitas Indonesia, 2018
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Ardin Wirayudi Aqmal
"Melihat pola sasaran serangan teroris dari tahun 2000 sampai 2009, teroris cenderung menjadikan tempat-tempat dengan simbol barat sebagai sasarannya. Seiring berjalannya waktu, terjadi pergeseran sasaran di mana polisi menjadi pertimbangan sasaran serangan teror. Penulisan ini menggunakan teori routine activity, rational choice dan crime pattern dengan mempertimbangkan tingkat keberhasilan serangan dengan kondisi kerentanan pengamanan yang ada. Penulisan ini menggunakan analisis data sekunder. Hasil penulisan ini memperlihatkan serangan pada Polda, Polres, Polsek hingga Pos Polisi akibat minimnya pengawasan dan keamanan. Selain itu ditemukan diantrannya masih terdapat Standar Operasional Prosedur (SOP) yang tidak sesuai. Upaya pencegahan yang dilakukan kantor polisi terhadap serangan teroris mencakup beberapa teknik dalam pencegahan kejahatan situasional

Seeing the pattern of targets of terrorist attacks from 2000 to 2009, terrorists tend to target places with western symbols as their targets. Over time, there was a shift in the target where the police became the target of terrorist attacks. This writing uses the theory of routine activity, rational choice and crime pattern by considering the success rate of attacks with the existing security vulnerability conditions. This writing uses secondary data analysis. The results of the writings showed attacks on the Regional Police, Polres, Polsek to Police Posts due to lack of supervision and security. In addition, it was found that there were still Standard Operating Procedures (SOPs) that were not appropriate. Prevention efforts undertaken by the police station against
terrorist attacks include several techniques in situational crime prevention.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2020
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>