Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 37189 dokumen yang sesuai dengan query
cover
Andress, Jason
"Summary :
The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
Contents
Machine generated contents note: Introduction What is Information Security? Identification and Authentication Authorization and Access Control Auditing and Accountability Cryptography Legal and Regulatory Issues Operations Security Human Element Security Physical Security Network Security Operating System Security Application Security.
"
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
cover
Andress, Jason
"As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The basics of information security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects."
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
"Information security analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information security analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.
The authors of information security analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization."
Waltham, MA: Syngress, 2015
e20427024
eBooks  Universitas Indonesia Library
cover
Stallings, William
London: Pearson Education, 2003
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
Winterfeld, Steve
"Contents :
Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed?"
Singapore: Elsiver , 2013
355.343 WIN b
Buku Teks  Universitas Indonesia Library
cover
Wang, Jie
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks  Universitas Indonesia Library
cover
"The basics of IT audit : purposes, processes, and practical information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements."
Waltham, MA: Syngress, 2014
e20427746
eBooks  Universitas Indonesia Library
cover
""This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher."
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks  Universitas Indonesia Library
cover
London: BTexact Technologies, 2002
005.8 INT
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>