Ditemukan 8612 dokumen yang sesuai dengan query
Lee, Viktor
"Firms have discovered that open source (OS) communities can be valuable sources of innovation. However, the access for firms to these communities turned to be intricate. One proven way of how firms can enter OS communities is via their personnel (“men on the inside”). Focusing on firm-sponsored OS communities, Viktor Lee detects the specific functions of MOI and how these individuals influence the community network by applying a comparative case study of two OSS firms. A netnographic and social network analysis of the community interactions of over 12,000 individuals was conducted. He concludes that firms can succeed in integrating a community into the firm’s development process with the help of the MOI."
Wiesbaden: Gabler Verlag, 2012
e20396981
eBooks Universitas Indonesia Library
Temperley, Alison
"Inside Knowledge provides practical guidance for women working in professional service firms who aspire to achieve their full potential in what have traditionally been male work environments. It aims to help women thrive within these organisations, and to rise to a level commensurate with their knowledge, skills, experience and talent."
United Kingdom: Emerald, 2017
e20469549
eBooks Universitas Indonesia Library
Schaarschmidt, Mario
"In this book, the author suggests that firms have basically two options to control project work beyond their boundaries and beyond their vertical command chains. The assumption is discussed against various theories of the firm as well as control theory and empirically tested by analyzing firm engagement in Eclipse open source projects as well as communication work in the Linux kernel project."
heidelberg: Gabler Verlag, 2012
e20396845
eBooks Universitas Indonesia Library
"Presents state-of-the-art research and practice in intelligence work. Describes novel tools and techniques for counterterrorism and open source intelligence. Provides perspectives on the future uses of open source intelligence. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities."
New York: Springer-Verlag / Wien, 2011
363.325 1 COU
Buku Teks Universitas Indonesia Library
Ying-Dar, Lin
New York: McGraw-Hill, 2012
004.6 LIN c
Buku Teks SO Universitas Indonesia Library
Faircloth, Jeremy
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester."
Waltham, Mass: Elsevier, 2011
005.8 FAI p
Buku Teks SO Universitas Indonesia Library
McQuaiq, Jack H.
New York : Frederick Fell, 1973
153.8 MCQ h
Buku Teks SO Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Rhyno, Art
London: Libraries Unlimited, 2004
025.002 85 RHY u
Buku Teks SO Universitas Indonesia Library
"one of important applicatons in GIS is the ability to determine position of an address. In the past years there were significant improvement in finding address position by internet mapping APIs komersial dan internet services...."
Artikel Jurnal Universitas Indonesia Library