Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 40041 dokumen yang sesuai dengan query
cover
Andress, Jason
"As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The basics of information security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects."
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Andress, Jason
"Summary :
The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
Contents
Machine generated contents note: Introduction What is Information Security? Identification and Authentication Authorization and Access Control Auditing and Accountability Cryptography Legal and Regulatory Issues Operations Security Human Element Security Physical Security Network Security Operating System Security Application Security.
"
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
cover
Wang, Jie
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks SO  Universitas Indonesia Library
cover
""This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher."
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks  Universitas Indonesia Library
cover
Javier Lopez, editor
"The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community."
Berlin: [, Springer-Verlag], 2012
e20410495
eBooks  Universitas Indonesia Library
cover
Mufti Rizal
"Kementerian Sekretariat Negara memiliki tugas pokok dan fungsi dalam memberikan dukungan teknis dan administratif yang prima kepada Presiden dan Wakil Presiden serta pelayanan informasi kepada masyarakat luas secara cepat, akurat, komprehensif, konsisten, dan akuntabel. Untuk mendukung tugas pokok dan fungsi tersebut sudah semestinya memiliki sistem manajemen keamanan informasi dalam menjaga dan melindungi aset data dan informasi yang dimiliki untuk mencegah dan menanggulangi terjadinya kejahatan komputer yang mengancam aset-aset penting pada Kementerian Sekretariat Negara yang memiliki tingkat kekritisan tinggi dan vital yang berisi tentang data dan informasi bersifat kenegaraan dalam kaitan layanan kepada Presiden dan Wakil Presiden.
Oleh karenanya dalam rangka penerapan sistem manajemen keamanan informasi tersebut diperlukan kajian yang komprehensif, salah satunya adalah dengan menggunakan Penilaian Indeks KAMI yang bertujuan untuk mengetahui tingkat kesiapan dan kematangan sistem manajemen keamanan informasi yang dalam kajian ini adalah di Kementerian Sekretariat Negara dengan menilai faktor-faktor: tata kelola, pengelolaan risiko, kerangka kerja, pengelolaan aset serta teknologi dan keamanan informasi.
Adapun hasil dari penelitian ini adalah tersusunnya rekomendasi berkaitan dengan sistem manajemen keamanan informasi yang sesuai dengan kondisi di Kementerian Sekretariat Negara berdasarkan hasil penilaian Indeks KAMI sehingga dapat diterapkan secara sistematis.

Ministry of State Secretariat has duties and functions in providing technical support and administrative excellence to President and Vice President as well as an information service to the public in a timely, accurate, comprehensive, consistent, and accountable. To support the main tasks and functions it should have an information security management system to maintain and protect the data and information assets held to prevent and combat computer crimes that threaten critical assets to the Ministry of the State Secretariat who has a high level of critical and vital that contains about the data and information is a state in terms of service to the President and Vice President.
Therefore, in order to implement the information security management system required a comprehensive study, one of which is using Indeks KAMI Assessment which aims to determine the level of readiness and maturity of information security management systems in this study is in the Ministry of the State Secretariat to assess the factors: governance, risk management framework, as well as asset management and information security technologies.
The results of this research is the formulation of recommendations concerning the information security management system in accordance with the conditions in the Ministry of the State Secretariat based on the assessment of Indeks KAMI that can be applied systematically.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Winterfeld, Steve
"Contents :
Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed?"
Singapore: Elsiver , 2013
355.343 WIN b
Buku Teks  Universitas Indonesia Library
cover
"The basics of IT audit : purposes, processes, and practical information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements."
Waltham, MA: Syngress, 2014
e20427746
eBooks  Universitas Indonesia Library
cover
Maiwald, Eric
New York: McGraw-Hill Technology Education, 2004
005.8 MAI f
Buku Teks SO  Universitas Indonesia Library
cover
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>