Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7205 dokumen yang sesuai dengan query
cover
Whitman, Michael E.
Boston: CENGAGE LEARNING CUSTOM, 2018
005.8 WHI p
Buku Teks  Universitas Indonesia Library
cover
Boehm, Franziska
"Current developments in EU internal security policy, such as increased information sharing (which includes the exchange of personal data between European law enforcement agencies and judicial actors in the area of freedom, security and justice (Europol, Eurojust, Frontex and OLAF)) and the access of EU agencies, in particular Europol and Eurojust, to data stored in European information systems such as the SIS (II), VIS, CIS or Eurodac raise interesting questions regarding the balance between the rights of individuals and security interests. This book deals with the complexity of the relations between these actors and offers for the first time a comprehensive overview of the structures for information exchange in the area of freedom, security and justice and their compliance with data protection rules in this field."
Berlin: Springer, 2012
e20400234
eBooks  Universitas Indonesia Library
cover
Graham, Benjamin, 1894-1976
New York, N.Y.: McGraw-Hill, 1962
332.63 GRA s
Buku Teks  Universitas Indonesia Library
cover
Stallings, William
New York: Pearson, 2018
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
Slater, Ken
New York: Stockton Press, 1991
005.8 SLA i
Buku Teks  Universitas Indonesia Library
cover
Caeilli, William
New York: Macmillan, 1991
658.4 CAE i
Buku Teks  Universitas Indonesia Library
cover
Cohen, Frederick B.
New York: John Wiley & Sons, 1995
005.8 COH p
Buku Teks  Universitas Indonesia Library
cover
Calder, Alan
London: kogan page limited, 2005
005.8 CAL b (1)
Buku Teks  Universitas Indonesia Library
cover
Hershey: IRM Press, 2005
303.483 Inf
Buku Teks  Universitas Indonesia Library
cover
Peltier, Thomas
"Abstract:
"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis""
Boca Raton [Florida]: CRC Press, 2014
005.8 PEL i
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>