Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 158776 dokumen yang sesuai dengan query
cover
Fajrillah
Bogor: Ghalia Indonesia, 2011
005.2 FAJ s (1);005.2 FAJ s (2);005.2 FAJ s (2)
Buku Teks SO  Universitas Indonesia Library
cover
Dimas Radhitya
"Wazuh merupakan sistem Security Information Event Management (SIEM) dan aplikasi open-source host-based intrusion detection sistem (HIDS) yang dapat melakukan memantau infrastruktur, mendeteksi ancaman, upaya penyusupan, anomali sistem, penilaian konfigurasi, dan tindakan pengguna yang tidak sah. Wazuh juga menyediakan kerangka kerja untuk respons insiden dan kepatuhan terhadap peraturan (Regulatory Compliance). Penelitian ini akan mengembangkan Wazuh dengan mengintegrasikan tiga Application Programming Interface (API) untuk meningkatkan kinerja Wazuh sebagai sistem SIEM. Penelitian ini akan membandingkan Wazuh dengan Solarwinds SEM untuk membandingkan kinerja dari kedua sistem SIEM dengan melakukan lima skenario penyerangan. Skenario tersebut dilakukan untuk menguji kinerja deteksi serangan dari kedua sistem SIEM. Sebelum scenario dilakukan penulis mengintegrasikan tiga API yaitu VirusTotal, Yara dan Suricata untuk memaksimalkan kinerja sistem SIEM Wazuh. Sistem SIEM Wazuh mempunyai akurasi sebesar 100% dalam mendeteksi seluruh serangan yang dilakukan sementara sistem SIEM Solarwinds SEM hanya mempunyai akurasi sebesar 40% dalam mendeteksi kelima skenario.

Wazuh is a Security Information Event Management (SIEM) and open-source host-based intrusion detection system (HIDS) application that can monitor infrastructure, detect threats, intrusion attempts, system anomalies, configuration assessments, and unauthorized user actions. Wazuh also provides a framework for incident response and regulatory compliance. This research will develop Wazuh by integrating three Application Programming Interfaces (API) to improve Wazuh's performance as a SIEM system. This study will compare Wazuh with Solarwinds SEM to compare the performance of the two SIEM systems by performing five attack scenarios. The scenario was carried out to test the attack detection performance of the two SIEM systems. Before the scene was carried out, the author integrated three APIs, namely VirusTotal, Yara, and Suricata to maximize the performance of the Wazuh SIEM system. The Wazuh SIEM system has 100% accuracy in detecting all attacks carried out while the Solarwinds SEM SIEM system only has 40% accuracy in detecting all five scenarios."
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Asep Sunandar
"Green computing adalah perilaku menggunakan sumber daya komputasi secara efisien yang dilakukan dengan cara memaksimalkan efisiensi energi, memperpanjang masa pakai perangkat keras, meminimalkan penggunaan kertas, dan beberapa hal teknis lainnya. Skripsi ini mengimplementasikan konsep green computing dengan cara menghemat konsumsi sumber daya pada prosesor pada perangkat keras dengan menggunakan metode Undervolt demi menghemat penggunaan baterai, umur kipas, dan memperkecil kerusakan Laptop akibat overheat. Undervolt merupakan proses mengurangi voltase berlebih yang masuk ke CPU dengan menggunakan software ataupun melalui BIOS pada komputer. Undervolt tidak mempengaruhi performa secara signifikan, karena yang mempengaruhi performa adalah overclocking dan underclocking. Berdasarkan hasil penelitian yang mengimplementasikan metode undervolt ini. Sistem operasi Windows memiliki effisiensi energi sebesar 6.37% sedangkan sistem operasi Ubuntu sebesar 3.29%.

Green computing is behavior to use resources computation in which conducted by ways of maximizing efficient energy efficiency, hardware, extending the use minimize the use of paper, and some other technical issues. This thesis implement the concept of green computing by means of save consumption resources at processor on hardware by using the method undervolt for save the use of batteries, a fan, age and minimize damage laptop due to overheat. Undervolt is process of reducing voltages excess that empties into the cpu by the use of software or via bios on a computer. Undervolt significantly, not affecting the performances because that affects its performance is overclocking and underclocking. Based on the results of research implement methods undervolt this. An operating system, windows having effisiensi energy 6.37 % while operating system ubuntu of 3.29 %."
Depok: Fakultas Teknik Universitas Indonesia, 2012
S1968
UI - Skripsi Open  Universitas Indonesia Library
cover
Wali Eko Djatmiko
Yogyakarta: Andi , 1996
005.3 WAL m
Buku Teks  Universitas Indonesia Library
cover
Hartono Partoharsodjo
Jakarta: Elex Media Komputindo, 1989
005.1 PAR t
Buku Teks SO  Universitas Indonesia Library
cover
Abas Ali Pangera
Yogyakarta: Andi, 2010
005.43 ABA s
Buku Teks  Universitas Indonesia Library
cover
Agustina Melviani
"Kanker sigmoid merupakan salah satu penyakit keganasan pada saluran gastrointestinal yang banyak dialami pada masyarakat perkotan. Kanker sigmoid dapat menyebar ke secara langsung ke organ terdekatnya seperti ovarium. Salah satu tindakan pembedahan yang dapat dilakukan adalah dengan operasi sigmoidektomi dan histerektomi. Berdasarkan jurnal terkait, pasien paska operasi sigmoidektomi dan histerektomi berisiko masing-masing sebesar 14 dan 54 untuk terjadi injuri uretra dengan gejala kelemahan pada spingter uretra sehingga dapat menyebabkan inkontinensia urine. Salah satu tindakan keperawatan yang dapat dilakukan untuk mencegah masalah tersebut ialah dengan melakukan latihan kegel. Latihan kegel yang dilkukan secara rutin dapat membantu meningkatkan kekuatan otot pelvis dan menguatkan sfingter uretra. Latihan dilakukan bertahap sebanyak 4x10 set dalam sehari. Evaluasi latihan kegel dilakukan dengan palpasi bladder untuk mengevaluasi pengosongan bladder setelah miksi. Sebelum latihan kegel dilakukan, penanganan manajemen nyeri pada pasien paska operasi harus dilakukan dengan baik terlebih dahulu agar toleransi latihan kegel tinggi sehingga latihan dapat dilakukan.

Sigmoid cancer is a malignancy of the gastrointestinal tract that is experienced by the urban community. Sigmoid cancer can spread directly to nearby organs such as ovary. One of the surgery choices is sigmoidectomy and hysterectomy. Based on the relevant journal, patients were treated with this method have risk of 14 and 54 respectively for urethra injury which symptoms is weakness of the urethra sphincter, resulting in urine incontinence. One of the interventions that can prevent patients from the urine incontinence is Kegel exercise. Regular exercises can help improve and strengthen control of the urethra sphincter. Exercises done gradually as 4x10 sets in a day. The evaluation of exercise using a bladder palpation to evaluate bladder emptying after micturition. Before kegel exercise is started, handling the management of pain post surgery must be performed well so that patients have a high tolerance of kegel exercises and the exercise can be done soon after surgery."
Depok: Fakultas Ilmu Keperawatan Universitas Indonesia, 2017
PR-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Siever, Ellen
Beijing: O'Reilly, 2003
005.432 SIE l
Buku Teks  Universitas Indonesia Library
cover
Lin, Forest
El Granada: Scott/Jones, 1991
005.43 LIN d
Buku Teks  Universitas Indonesia Library
cover
Soyinka, Wale
"Deploy and manage a Linux server quickly and easilyThoroughly revised to cover the most current Linux distributions and the latest Linux kernel release, Linux Administration: A Beginner?s Guide, Sixth Edition shows new and inexperienced Linux system administrators how to set up and configure Linux. The sixth edition adds key updates about the latest Linux distributions and focuses on Fedora, openSUSE, and Ubuntu. The book adds coverage of newer technologies, including virtualization, infrastructure services, Windows and Linux integration, Linux routers and firewalls, LDAP, printing, and new hardware now supported by the updated Linux kernel.This trusted, bestselling beginner?s guide continues its recipe and step-by-step approach to Linux system administration, including managing files and software, users and user rights, basic security, Internet and intranet services, and kernel customization. The book makes it easy for existing system administrators to quickly zero in on relevant sections of the book to solve or tackle real-world Linux administration issues.Linux Administration: A Beginner?s Guide, Sixth Edition Covers the major distributions of Linux server for Fedora, openSUSE and Ubuntu, and the latest Linux kernel release Includes new chapters introducing Distributed File Systems--key for today?s cloud computing/virtualization-centric world Contains a new chapter on the business case for Linux and the marketability of Linux administration skills Step-by-step coverage: Technical Summary of Linux Distributions and Windows Server 2008; Installing Linux in a Server Configuration; Installing Software; Single Host Administration; Managing Users; The Command Line; Booting and Shutting Down; File Systems; Core System Services; Compiling the Linux Kernel; Knobs and Dials: The /proc File System; Security and Networking; TCP/IP for System Administrators; Network Configuration; Configuring the Linux Firewall and Router; Local Security; Network Security; Configuring Internet Services; DNS; FTP; Web Servers; SMTP; POP and IMAP; SSH and Encryption; Virtualization; Configuring Intranet Services; Network File Systems (NFS); Distributed File Systems; Network Information Service (NIS); LDAP; Samba (SMB/CIFS); Printing; DHCP; Backups "-- Provided by publisher.
"Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. Linux Administration: A Beginner?s Guide, Sixth Edition provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice."
New York: McGraw-Hill, 2012
005.432 SOY l
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>