Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 122 dokumen yang sesuai dengan query
cover
Schiffman, Mike, author
New York : Wiley, 2003
005.8 SCH b (1)
Buku Teks  Universitas Indonesia Library
cover
Stallings, William, author
Boston: Pearson, 2014
005.8 STA n
Buku Teks  Universitas Indonesia Library
cover
Stallings, William, author
New York: Prentice-Hall, 1995
005.8 STA n
Buku Teks  Universitas Indonesia Library
cover
Stallings, William, author
Singapore : Pearson, 2011
005.8 STA n
Buku Teks  Universitas Indonesia Library
cover
Tasevski, Predrag, author
Saarbrücken: Lap Lambert Academic Publishing , 2012
005.8 TAS i
Buku Teks  Universitas Indonesia Library
cover
Whitman, Michael E., author
Boston: CENGAGE LEARNING CUSTOM, 2018
005.8 WHI p
Buku Teks  Universitas Indonesia Library
cover
Traore, Issa, author
Hershey: information Science Reference, 2012
006.24 TRA c
Buku Teks  Universitas Indonesia Library
cover
Mufti Rizal, author
Kementerian Sekretariat Negara memiliki tugas pokok dan fungsi dalam memberikan dukungan teknis dan administratif yang prima kepada Presiden dan Wakil Presiden serta pelayanan informasi kepada masyarakat luas secara cepat, akurat, komprehensif, konsisten, dan akuntabel. Untuk mendukung tugas pokok dan fungsi tersebut sudah semestinya memiliki sistem manajemen keamanan informasi dalam menjaga...
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Audun Josang, editor
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security,...
Berlin: Springer, 2012
e20406998
eBooks  Universitas Indonesia Library
cover
Cremers, Cas, author
The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data....
Berlin: Springer-Verlag, 2012
e20407791
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>