Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 13687 dokumen yang sesuai dengan query
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, [2001;2001;2001, 2001]
364.1 BAR c IV
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
"Dayal, Denzyl P."
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c I (1)
Buku Teks  Universitas Indonesia Library
cover
Akhgar, Babak
"Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
"
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Rinaldi Ikhsan Nasrulloh
"Skripsi ini berfokus pada masalah upaya pencegahan yang dilakukan oleh Badan Nasional Penanggulangan Terorisme (BNPT) terhadap cyber propaganda oleh Islamic State of Iraq and Syria (ISIS) di Indonesia. Pembahasan masalah ini dianalisis dengan menggunakan konsep high policing. Pendekatan yang digunakan ialah pendekatan kualitatif dengan tujuan deskriptif. Hasil penelitian menunjukkan bahwa upaya pencegahan yang dilakukan oleh BNPT dalam mencegah cyber propaganda ISIS di Indonesia, dapat menggunakan metode high policing. Meskipun penerapan karakteristik high policing tidak selalu dapat diterapkan untuk kebijakan di BNPT. Hal ini disebabkan hukum dan pedoman organisasi yang tidak sejalan dengan karakteristik dari high policing.

This thesis focuses on the problem of prevention efforts undertaken by the National Counter Terrorism Agency (BNPT) against the cyber propaganda of the Islamic State of Iraq and Syria (ISIS) in Indonesia. Discussion of this issue was analyzed using the concept of high policing. The approach used is a qualitative approach with descriptive purposes only. The results show that prevention efforts undertaken by BNPT in preventing cyber propaganda ISIS in Indonesia, can use the method of high policing. Although the application of the characteristics of high policing cannot always be applied to policies.
"
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2017
S67756
UI - Skripsi Membership  Universitas Indonesia Library
cover
Button, Mark
"Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud. Book jacket."
New York : Routledge, 2017
364.163 BUT c
Buku Teks  Universitas Indonesia Library
cover
"Introduction to Cyber-warfare : a multidisciplinary approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it."
Waltham, MA: Syngress, 2013
e20427002
eBooks  Universitas Indonesia Library
cover
Dudeja, V.D.
New Delhi: Commonwealth, 2002
364.1 DUD I c (1)
Buku Teks  Universitas Indonesia Library
cover
Shipley, Todd G.
"Written by experts on the frontlines, Investigating internet crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations.
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover."
Waltham, MA: Steven Elliot, 2014
e20427145
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>