Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 28477 dokumen yang sesuai dengan query
cover
"Information security analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information security analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.
The authors of information security analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization."
Waltham, MA: Syngress, 2015
e20427024
eBooks  Universitas Indonesia Library
cover
Andress, Jason
"As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The basics of information security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects."
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Andress, Jason
"Summary :
The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
Contents
Machine generated contents note: Introduction What is Information Security? Identification and Authentication Authorization and Access Control Auditing and Accountability Cryptography Legal and Regulatory Issues Operations Security Human Element Security Physical Security Network Security Operating System Security Application Security.
"
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
cover
Shema, Mike
"How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there."
London: Elsevier , 2012
005.8 SHE h
Buku Teks SO  Universitas Indonesia Library
cover
Mufti Rizal
"Kementerian Sekretariat Negara memiliki tugas pokok dan fungsi dalam memberikan dukungan teknis dan administratif yang prima kepada Presiden dan Wakil Presiden serta pelayanan informasi kepada masyarakat luas secara cepat, akurat, komprehensif, konsisten, dan akuntabel. Untuk mendukung tugas pokok dan fungsi tersebut sudah semestinya memiliki sistem manajemen keamanan informasi dalam menjaga dan melindungi aset data dan informasi yang dimiliki untuk mencegah dan menanggulangi terjadinya kejahatan komputer yang mengancam aset-aset penting pada Kementerian Sekretariat Negara yang memiliki tingkat kekritisan tinggi dan vital yang berisi tentang data dan informasi bersifat kenegaraan dalam kaitan layanan kepada Presiden dan Wakil Presiden.
Oleh karenanya dalam rangka penerapan sistem manajemen keamanan informasi tersebut diperlukan kajian yang komprehensif, salah satunya adalah dengan menggunakan Penilaian Indeks KAMI yang bertujuan untuk mengetahui tingkat kesiapan dan kematangan sistem manajemen keamanan informasi yang dalam kajian ini adalah di Kementerian Sekretariat Negara dengan menilai faktor-faktor: tata kelola, pengelolaan risiko, kerangka kerja, pengelolaan aset serta teknologi dan keamanan informasi.
Adapun hasil dari penelitian ini adalah tersusunnya rekomendasi berkaitan dengan sistem manajemen keamanan informasi yang sesuai dengan kondisi di Kementerian Sekretariat Negara berdasarkan hasil penilaian Indeks KAMI sehingga dapat diterapkan secara sistematis.

Ministry of State Secretariat has duties and functions in providing technical support and administrative excellence to President and Vice President as well as an information service to the public in a timely, accurate, comprehensive, consistent, and accountable. To support the main tasks and functions it should have an information security management system to maintain and protect the data and information assets held to prevent and combat computer crimes that threaten critical assets to the Ministry of the State Secretariat who has a high level of critical and vital that contains about the data and information is a state in terms of service to the President and Vice President.
Therefore, in order to implement the information security management system required a comprehensive study, one of which is using Indeks KAMI Assessment which aims to determine the level of readiness and maturity of information security management systems in this study is in the Ministry of the State Secretariat to assess the factors: governance, risk management framework, as well as asset management and information security technologies.
The results of this research is the formulation of recommendations concerning the information security management system in accordance with the conditions in the Ministry of the State Secretariat based on the assessment of Indeks KAMI that can be applied systematically.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Mohammad Tehranipoor, editor
"This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures."
New York: [Springer, ], 2012
e20418611
eBooks  Universitas Indonesia Library
cover
""This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher."
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks  Universitas Indonesia Library
cover
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks SO  Universitas Indonesia Library
cover
Whitman, Michael E.
Boston: CENGAGE LEARNING CUSTOM, 2018
005.8 WHI p
Buku Teks SO  Universitas Indonesia Library
cover
Wang, Jie
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>