Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 14719 dokumen yang sesuai dengan query
cover
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks  Universitas Indonesia Library
cover
Alsmadi, Izzat
"This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
"
Switzerland: Springer Nature, 2019
e20509570
eBooks  Universitas Indonesia Library
cover
Buchele, Robert B.
New York: McGraw-Hill, 1977
658 BUC m
Buku Teks  Universitas Indonesia Library
cover
Sulistyanto Widagdo
"ABSTRAK
Sales of video surveillance services, especially those integrated with artificial intelligence based services, should be anticipated by the Indonesian government because it can affect cybersecurity stability. On the one hand, data obtained from the operation of a video surveillance system can be useful for the benefit of national security and or law enforcement. But on the other hand, if the data is controlled and misused by criminals and or terrorists, then cybersecurity risks become large. Institutionally, currently in Indonesia, there are at least 4 government agencies that have duties related to business control of video surveillance services, namely the Ministry of Trade, Ministry of Communication and Information, Republic of Indonesia National Police, and National Cyber and Crypto Agency. However, there is no clarity regarding effective institutional construction to strive so that the interests of cybersecurity stability can run in balance with the interests of increasing the digital economy. By applying a normative legal research methodology based on a conceptual approach, three institutional approaches were found that could be chosen to be included in Indonesia cybersecurity policy. However, the author argues that one institution that has its own authority in supervising the business of video surveillance services is the best solution capable of maintaining Indonesian cybersecurity while protecting the privacy rights of citizens."
Jakarta: Kementerian PPN/Bappenas, 2019
330 BAP 2:1 (2019)
Artikel Jurnal  Universitas Indonesia Library
cover
Taylor, James
Upper Saddle River: IBM- Press, 2012
658.403 2 TAY d (1)
Buku Teks  Universitas Indonesia Library
cover
Pakpahan, Victoria M.
"The development of technology has brought us to a world with much efficiency in many activities covering information exchange, economic, and social activities. The growing network is now connecting people all over the world-indiviuals, corporation, goverment institutions, even crime organization-with many types of device ranging from mobile phone, television, personal computer, to public infrastructure. A more interconnected world does not come with only advantages and opportunities, new threats are emerging in the virtual domain which we called as the cyberspace. This article elaborates the cyberspace with its threats form the wide scope of global context with the case study of Indonesia in particular. THe aim of this article is to introduce the needs of growing strategic management in cyber security. It also discusses cyberthreats as many people still do not aware of those threats and to generate thinkging over the importance of strategic management in cyber security, including an applicable strategy as we need a comprehensive reactive and proactive approach to tackle this issue in international relations today. Domestically, Indonesia also needs to further develop its cyber diplomacy to further anticipate any possible cyber disruptions to its national interest."
Jakarta: The Ary Suta Center, 2018
330 ASCSM 40 (2018)
Artikel Jurnal  Universitas Indonesia Library
cover
"The development of technology has brought us to a world with much efficiency in many activities covering information exchange, economic, and social activities. The growing network is now connecting people all over the world-indiviuals, corporation, goverment institutions, even crime organization-with many types of device ranging from mobile phone, television, personal computer, to public infrastructure. A more interconnected world does not come with only advantages and opportunities, new threats are emerging in the virtual domain which we called as the cyberspace. This article elaborates the cyberspace with its threats form the wide scope of global context with the case study of Indonesia in particular. THe aim of this article is to introduce the needs of growing strategic management in cyber security. It also discusses cyberthreats as many people still do not aware of those threats and to generate thinkging over the importance of strategic management in cyber security, including an applicable strategy as we need a comprehensive reactive and proactive approach to tackle this issue in international relations today. Domestically, Indonesia also needs to further develop its cyber diplomacy to further anticipate any possible cyber disruptions to its national interest."
Jakarta: The Ary Suta Center, 2018
330 ASCSM 40 (2018)
Artikel Jurnal  Universitas Indonesia Library
cover
"Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the shop; and what are the frequent paths), and to measure operational efficiency for improving customer experience. Video analytics has the enormous potential for non-security oriented commercial applications. This book presents the latest developments on video analytics for business intelligence applications. It provides both academic and commercial practitioners an understanding of the state-of-the-art and a resource for potential applications and successful practice.
"
Berlin: Springer, 2012
e20399044
eBooks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>