Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 326 dokumen yang sesuai dengan query
cover
Cremers, Cas, author
The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data....
Berlin: Springer-Verlag, 2012
e20407791
eBooks  Universitas Indonesia Library
cover
Weber, Rolf H., author
Anonymization explores the legal framework developed to help protect netizens’ privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should...
London: Springer, 2012
e20407911
eBooks  Universitas Indonesia Library
cover
Michael Chau, editor
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012). The 8 revised full papers and the...
Heidelberg: [, Springer-Verlag], 2012
e20409208
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Information security analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information security analytics dispels the myth that analytics within the information security domain is...
Waltham, MA: Syngress, 2015
e20427024
eBooks  Universitas Indonesia Library
cover
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve...
Waltham, MA: Syngress, 2014
e20427738
eBooks  Universitas Indonesia Library
cover
Singer, P. W., author
Summary: Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant...
Oxford, Chichester: Oxford University Press, 2014
005.8 SIN c
Buku Teks  Universitas Indonesia Library
cover
Andress, Jason, author
As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical...
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in...
Heidelberg: Springer, 2012
e20409390
eBooks  Universitas Indonesia Library
cover
Sidabutar, Roland, author
ISP (Internet Service Provider) diharapkan untuk mampu menawarkan layanan paket data melalui beberapa teknologi nirkabel (seperti: 3G, 802.11g, WiMAX). Seiring dengan perkembangan teknologi perangkat komunikasi sekarang ini, maka kebutuhan akan penggunaan jaringan teknologi 3G mengakibatkan penambahan jumlah traffic. Offloading jaringan seluler merupakan solusi yang cukup menjanjikan untuk digunakan sebagai alternatif...
Depok: Fakultas Teknik Universitas Indonesia, 2016
S63304
UI - Skripsi (Membership)  Universitas Indonesia Library