Ditemukan 50752 dokumen yang sesuai dengan query
Andrisky Aprianzal
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2009
S8271
UI - Skripsi Open Universitas Indonesia Library
Puspita Shinta Lestari
"Tesis ini membahas mengenai perlindungan program komputer open source di Indonesia. Penelitian ini adalah penelitian kualitatif dengan metode penelitian normatif deskiptif. Tujuan Penelitian ini adalah untuk menganalisis pengaturan perlindungan hak cipta terhadap open source Software, jenis lisensi yang dapat digunakan oleh open source Software, upaya hukum apakah yang dapat dilakukan oleh pemilik open source Software. Open Source Software adalah program komputer yang dalam pemberian lisensinya menyertakan source code agar dapat digunakan, dimodifikasi, dan didistribusikan kembali kepada pengguna selanjutnya. Sebagai program komputer, di Indonesia open source Software dilindungi dengan hak cipta. Lisensi yang digunakan untuk mendistribusikan open source Software adalah lisensi publik yang mengandung konsep copyleft untuk menjamin kebebasan source code dari Software yang didistribusikan dibawah lisensi publik, dalam hal ini GNU General Public License version 3. Pemegang hak cipta open source Software sebagaimana pemegang hak cipta lainnya dapat melakukan upaya hukum terhadap pelanggaran hak cipta atas ciptaan program komputernya sebagaimana telah diatur dalam Undang-Undang Nomor 19 Tahun 2002 tentang Hak Cipta."
Depok: Fakultas Hukum Universitas Indonesia, 2010
T37679
UI - Tesis Open Universitas Indonesia Library
"Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities."
New York: Springer-Verlag / Wien, 2011
363.325 1 COU
Buku Teks Universitas Indonesia Library
Ying-Dar, Lin
New York: McGraw-Hill, 2012
004.6 LIN c
Buku Teks SO Universitas Indonesia Library
Faircloth, Jeremy
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester."
Waltham, Mass: Elsevier, 2011
005.8 FAI p
Buku Teks SO Universitas Indonesia Library
Fajar Edisya Putera
"Teknologi intrusion detection & prevention merupakan teknologi pilihan bagi berbagai pihak saat ini untuk menjamin keamanan dan keabsahan informasi yang dimiliki oleh sebuah perusahaan. Perangkat Intrusion detection & prevention dapat digunakan untuk menggantikan perangkat keamanan lama seperti firewall. Perangkat Intrusion detection & prevention sendiri tersedia dalam berbagai jenis, dari yang berjenis perangkat lunak baik tanpa bayar(open source) atau bayar, hingga perangkat keras. Perangkat Intrusion detection & prevention berbasis open source mempunyai keunggulan dalam kemudahan kustomisasinya. Kustomisasi sangat dibutuhkan karena kebutuhan pengamanan setiap perusahaan biasanya sangat berbeda-beda, sehingga penerapan perangkat ini dalam suatu IPS(Intrusion Prevention System) akan memerlukan perlakuan khusus sesuai dengan kebutuhan perusahaan.
Dalam penelitian ini dilakukan pengembangan perangkat lunak untuk membantu IP yang memiliki kemudahan dalam kustomisasi tanpa mengurangi kemampuan perangkat lunak ini untuk mengenali gangguan keamanan jaringan lewat internet. Menganalisa masukan sebuah IP dalam jangka waktu 1 jam perangkat lunak membantu IPS dalam hal peringatan sehingga lebih baik mengenali sebuah gangguan keamanan jaringan internet. Hasil yang diperoleh dari penelitian ini ialah sebuah sistem keamanan intrusion detection & prevention dan kebijakan yang terstruktur namun tetap adaptif sehingga mampu menghadapi gangguan kemanan jaringan lewat internet yang selalu berkembang. Sistem peringatan gangguan keamanan yang lebih terarah menjadi kunci yang membuat perangkat lunak ini dapat membantu pengguna dalam menentukan apakah sebuah peringatan itu harus ditanggapi serius atau tidak.
Intrusion detection & prevention technology is a mechanism to guarantee security and protect information owned by a company. Intrusion detection & prevention technology has been known as a replacement for basic firewall technology. Intrusion detection & prevention technology are available software and hardware based. In software based can be as free(open source or not) or paid. Customization in the source code is one of the strength of open source based intrusion detection & prevention technology. Customization is needed because each company may need some behaviours from the technology itself, so the implementation of this IPS(Intrusion Prevention System) will need a special modification to fit company needs.
This research will develop an addon IPS software that is easy to customize without making IPS vulnerable a network security disruption over internet. The software will analyze an input IP address from one hour IPS log so it can recognize the attack. The result of this research is an intrusion detection & prevention security sistem and structured policies. The system itself can handle network security attack over the internet. The summarized security attack warning is the key to make sure the attack. This software will provide only the important warning to the user."
Depok: Universitas Indonesia, 2009
T-Pdf
UI - Tesis Open Universitas Indonesia Library
Wahid Nurfiantara, examiner
"Skripsi ini membahas tentang uji penerapan aplikasi open source ICA-AtoM 1.0.9 pada Kantor Arsip Universitas Indonesia. Masalah yang dibahas dalam penelitian ini adalah bagaimana hasil output data deskripsi arsip menggunakan ICA-AtoM, bagaimana proses temu-kembali arsip pada Kantor Arsip menggunakan ICAAtoM, apakah ICA-AtoM dapat diterapkan pada arsip perguruan tinggi (Kantor Arsip). Tujuan dari penelitian ini adalah mengidentifikasi efektifitas penerapan aplikasi ICA-AtoM pada arsip perguruan tinggi (Kantor Arsip) terutama dalam proses deskripsi arsip dan temu-kembali menggunakan ICA-AtoM. Hasil Penelitian menunjukkan penerapan ICA-AtoM memudahkan dalam proses temukembali arsip dan data deskripsi yang ditampilkan lengkap sesuai ISAD(G), elemen data yang ditampilkan ICA-AtoM dengan dokumen arsip asli sesuai, dengan teknologi open source dan web-based yang digunakan oleh ICA-AtoM Universitas Indonesia dapat mengembangkan aplikasi ini sesuai dengan kebutuhan Kantor Arsip
This thesis discusses the application of the application of ICA-AtoM open source 1.0.9 on the Central Arshives of the university (central archives), University of Indonesia .Issues discussed in this research is how to fit the data between the input data using ICA-Atom, how the archive retrieval process at central archives easier with ICA-Atom, whether ICA-Atom can be applied to college archives (central archives). The purpose of this study is to identify the effectiveness of the process of archival description and retrieval of ICA-atom atcentral archives, and to know the prospects for development of ICA-Atom. Research results show the application of ICA-Atom facilitate the retrieval process of records, data elements that appear in ICA-Atom with original archival documents in accordance, with open source technology and web-based that is used by ICA-Atom University of Indonesia to develop it in accordance with the needs of central archives ( University Archives Centre)"
Depok: Fakultas Ilmu Pengetahuan Budaya Universitas Indonesia, 2011
S15537
UI - Skripsi Open Universitas Indonesia Library
Khaflidotun Muslikhah
2012
LP-pdf
UI - Laporan Penelitian Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Rhyno, Art
London: Libraries Unlimited, 2004
025.002 85 RHY u
Buku Teks SO Universitas Indonesia Library