Ditemukan 327 dokumen yang sesuai dengan query
Contents :
- Table of contents by author
- Network security
- Wireless security
- Service-provider and enterprise business issues
- Authentication and encryption
- Regulation, standards, and protocols
- Acronym guide ...
Chicago: International Engineering Consortium, 2004
e20442515
eBooks Universitas Indonesia Library
Shema, Mike, author
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious...
London: Elsevier , 2012
005.8 SHE h
Buku Teks Universitas Indonesia Library
Universitas Indonesia, 2005
S24328
UI - Skripsi (Membership) Universitas Indonesia Library
Sri Chusri Haryanti, author
[ABSTRAK
Meningkatnya keberadaan, ketersediaan, kemampuan dan konektifitas perangkat bergerak telah menghasilkan paradigma baru dalam komunikasi bergerak. Salah satunya adalah implementasi fungsionalitas grid computing pada jaringan mobile ad hoc, yang dewasa ini dikenal dengan mobile ad hoc grid. Mobile ad hoc grid memungkinkan node dalam jaringan mobile ad hoc berbagi sumber daya...
2014
D1948
UI - Disertasi (Membership) Universitas Indonesia Library
Benny, Daniel J, author
Machine generated contents note: 1.Importance of Culture Property Protection: Museums, Historic Sites, Archives, and Libraries
Introduction
Museums
Private Museums
Local Museums
County Museums
State Museums
National Museums
Military Museums
Historic Sites
Private, Local, and County Historic Sites
State Historic Sites
National Historic Sites
Archives
Private, Local, and County Archives
State Archives
National Archives
Libraries
Private Libraries
Campus Libraries
Local Libraries
County Libraries
State Libraries
National Libraries
Summary
Bibliography
2.Security Threats to Museums, Historic Sites, Archives, and...
Boca Raton, FL : CRC Press, 2013
363.69 BEN c
Buku Teks Universitas Indonesia Library
Androulidakis, Iosif I., author
Mobile phone security and forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware...
New York: [, Springer], 2012
e20418401
eBooks Universitas Indonesia Library
Snedaker, Susan, author
Powerful earthquake triggers tsunami in Pacific. Hurricane Isaac makes landfall in the Gulf Coast. Wildfires burn hundreds of houses and businesses in Colorado. Tornado touches down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals...
Waltham, MA: Syngress, 2014
e20426840
eBooks Universitas Indonesia Library
Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive...
Waltham, MA: Chandos, 2015
e20426960
eBooks Universitas Indonesia Library
Lidya Desnawati, author
ABSTRAK
Pencahayaan pada malam hari yang tidak optimal mengakibatkan banyaknya kejahatan di area kampus yang terjadi pada malam hari. Kualitas pencahayaan dan pemberitaan mengenai isu kriminalitas yang terjadi di kampus mempengaruhi persepsi rasa aman di kampus. Selain kualitas pencahayaan, persepsi rasa aman juga dipengaruhi oleh karakter individu dan kondisi lingkungan. Penulisan...
2016
S63512
UI - Skripsi (Membership) Universitas Indonesia Library
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks Universitas Indonesia Library