Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 40147 dokumen yang sesuai dengan query
cover
Orozco, J. Martín Serrano
"This book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems."
New York: [, Springer Science], 2012
e20418223
eBooks  Universitas Indonesia Library
cover
Messier, Ric
"Collaboration with cloud computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses :
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network"
Waltham, MA: Syngress, 2014
e20426883
eBooks  Universitas Indonesia Library
cover
Messier, Ric
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- Provided by publisher."
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks SO  Universitas Indonesia Library
cover
Bayu Kurnianto
"ABSTRAK
TNI Angkatan Laut sebagai komponen utama pertahanan negara di laut memiliki tugas diantaranya melaksanakan bidang pertahanan matra laut, menegakkan hukum dan menjaga keamanan di wilayah laut yurisdiksi nasional. Adapun ancaman yang dihadapi yaitu Operasi Militer Perang OMP berupa Agresi Militer dan Operasi Militer Selain Perang OMSP antara lain Bencana Alam, Kejahatan Lintas Negara, Pelanggaran Keamanan Laut, SAR / Kecelakaan Laut, dan untuk mendukung pelaksanaan OMP dan OMSP dibutuhkan peran Teknologi Informasi dan Komunikasi.Dinas Informasi dan Pengolahan Data Angkatan Laut sebagai Pembina Teknis Sistem Informasi di Lingkungan TNI AL harus mampu menyiapkan segala sarana dan prasarana yang meningkatkan kinerja Teknologi Informasi TI . Berkaitan dengan TI, TNI AL harus memiliki Arsitektur TI yang mampu memberikan layanan sistem informasi dan infrastruktur TI untuk seluruh bidang dan fungsi yang ada di TNI AL. Penggunaan informasi yang terdiri dari bidang operasi, intelijen, logistik. personel, perencanaan anggaran dan keuangan serta bidang khusus menuntut arsitektur TI yang handal dan lentur terhadap perkembangan.The Open Grup Architecture Kerangka kerja TOGAF memiliki kemampuan yang dapat mendukung perancangan Arsitektur TI di TNI AL. Kondisi TI yang belum terintegrasi, kebutuhan SI yang terus meningkat, kemajuan teknologi seperti virtualisasi cloud computing, maka perlu rancangan arsitektur TI. Hasil akhir dari penelitian ini adanya Rancangan Arsitektur Teknologi Informasi di lingkungan TNI AL yang dapat diimplementasikan oleh Disinfolahtal sebagai Pembina teknis sistem informasi.

ABSTRACT
Indonesia Navy as a major component of the national defense in the sea has the task of which carry out naval defense field, enforcing the law and maintaining security in the sea areas of national jurisdiction. Some threats that has to face are the Military Operation of War MOW such as military aggression and the Military Operations Other Than War MOTW such as Natural Dissaster, Transnational Crime, Sea Security Breach, SAR Marine Accidents, and to deal with that required a major tool weapon systems Alutsista superior.Information and Data Manajemen Services of the Navy as supervisor Technical Environmental Information System in the Indonesia Navy to be able to prepare all facilities and infrastructure is useful to enhance the performance of Information Technology. In connection with the Navy IT should have IT architecture capable of providing information system services and IT infrastructure for the entire area and functions that exist in the Indonesia Navy. Use of information consisting of field operations, intelligence, logistics. personnel, budget and financial planning as well as specialized field requires IT architecture to the development of a reliable and flexible.The Open Grup Architecture Framework TOGAF has the capability to support the design of the IT architecture in the Indonesian Navy. Conditions Information Technology that are not integrated, the need for information systems continues to increase, technological advances such as virtualization and cloud computing, it is necessary to design the architecture of Information Technology. The end result of this research the Architectural Design of Information Technology in the Indonesia Navy that can be implemented by Information and Data Manajemen Services of the Navy as supervisor of technical information systems."
2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Mari Carmen Suarez-Figueroa
"This book, provides the necessary methodological and technological support for the development and use of ontology networks, which ontology developers need in this distributed environment. After an introduction, in its second part the authors describe the NeOn Methodology framework. The book’s third part details the key activities relevant to the ontology engineering life cycle. For each activity, a general introduction, methodological guidelines, and practical examples are provided. The fourth part then presents a detailed overview of the NeOn Toolkit and its plug-ins. Lastly, case studies from the pharmaceutical and the fishery domain round out the work.
"
Berlin: Springer-Verlag, 2012
e20408109
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 5th International Conference on Data Management in Grid and Peer-to-Peer Systems, Globe 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012.
The 9 revised full papers presented were carefully reviewed and selected from 15 submissions. The papers are organized in topical sections on data management in the cloud, cloud MapReduce and performance evaluation, and data stream systems and distributed data mining."
Berlin: Springer-Verlag, 2012
e20410090
eBooks  Universitas Indonesia Library
cover
Devi Thiyagarajan
"Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud."
Depok: Faculty of Engineering, Universitas Indonesia, 2015
UI-IJTECH 6:3 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
Tran, Duc A.
"Data storage for social networks : a socially aware approach is aimed at reviewing the current literature of data storage for online social networks and discussing new methods that take into account social awareness in designing efficient data storage"
New York: [Springer, ], 2012
e20419664
eBooks  Universitas Indonesia Library
cover
Comer, Douglas E.
"Appropriate for all introductory-to-intermediate courses in computer networking, the Internet, or Internet applications; students need no background in networking, operating systems, or advanced mathematics. Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, not mathematical proofs."
Harlow, Essex: Pearson, 2015
004.6 COM c
Buku Teks  Universitas Indonesia Library
cover
Comer, Douglas E.
New Jersey: Prentice-Hall, 1997
004.6 COM c
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>