Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 15431 dokumen yang sesuai dengan query
cover
Evans, Alan (Alan D.)
Boston: Pearson, 2016
004 EVA t
Buku Teks SO  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Convergence and Hybrid Information Technology, ICHIT 2012, held in Daejeon, Korea, in August 2012. The 102 revised full papers presented were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on communications and networking, soft computing and intelligent systems, medical information and bioinformatics, security and safety systems, HCI and data mining, software and hardware engineering, image processing and pattern recognition, robotics and RFID technologies, convergence in information technology, and workshop on advanced smart convergence (IWASC)."
Berlin: Springer-Verlag, 2012
e20409490
eBooks  Universitas Indonesia Library
cover
""This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher."
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks  Universitas Indonesia Library
cover
Turban, Efraim, 1930-
"This text is based on the fundamental premise that the major role of information technology (IT) is to support employees, regardless of their functional area or level in the organization, and it provides the tools that enable all employees to better perform their jobs."
New York: John Wiley & Sons, 2003
658TURI001
Multimedia  Universitas Indonesia Library
cover
O`Brien, James A., 1936-
Boston : McGraw-Hill , 1999
658.403 8 OBR m
Buku Teks SO  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012. The 38 revised papers were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on information systems, information technology, information management, business intelligence, management science and education, applications, workshop on program protection and reverse engineering."
Berlin: Springer-Verlag, 2012
e20409918
eBooks  Universitas Indonesia Library
cover
Senft, Sandra
"This book is updated to address cloud computing, web-based applications, and server virtualization, the fourth edition of this bestselling text provides a comprehensive overview of IT controls and audits. It facilitates a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Supporting and analyzing the COBIT model, the book prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage IT resources.
Updated to address cloud computing, web-based applications, and server virtualization, the fourth edition of this bestselling text provides a comprehensive overview of IT controls and audits. It facilitates a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Supporting and analyzing the COBIT model, the book prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage IT resources"--Provided by publisher.
Preface This book is designed to meet the increasing need for information technology (IT) and audit professionals to understand IT governance and controls required to manage this key resource. This book can be used by IT and audit professionals to gain an understanding of IT governance, controls and audit practices. This book aligns to and supports the Control Objectives for Information and Related Technology (Cobi T) model and assists in preparation for the Certified Information Systems Auditor (CISA) exam. Exhibit 1 provides a map of this text to the CISA exam. Exam (%) CISA Examination Content Areas to Model Curriculum (Undergraduate) IT Audit and Control IT Planning and Organization IT Acquisition Implementation IT Delivery and Support Advanced Topics Title and Description 14 The IS audit process Provides IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its IT and business systems are protected and controlled"--Provided by publisher."
Boca Raton: CRC Press, 2013
658.4 SEN i
Buku Teks  Universitas Indonesia Library
cover
"This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in many types of future technology.
The main scope of FutureTech 2012 is as follows : hybrid information technology cloud and cluster computing ubiquitous networks and wireless communications multimedia convergence intelligent and pervasive applications security and trust computing IT management and service bioinformatics and bio-inspired computing database and data mining knowledge system and intelligent agent human-centric computing and social networks."
Dordrecht, Netherlands: [Springer, ], 2012
e20399380
eBooks  Universitas Indonesia Library
cover
"This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in many types of future technology.
The main scope of FutureTech 2012 is as follows : hybrid information technology cloud and cluster computing ubiquitous networks and wireless communications multimedia convergence intelligent and pervasive applications security and trust computing IT management and service bioinformatics and bio-inspired computing database and data mining knowledge system and intelligent agent human-centric computing and social networks."
Dordrecht, Netherlands: [, Springer], 2012
e20399397
eBooks  Universitas Indonesia Library
cover
Puji Syukur Sumantri
"PT XYZ telah berkembang menjadi salah satu penyedia infrastruktur TIK (teknologi informasi dan komunikasi) terkemuka di Indonesia. Kategori layanan yang diberikan PT XYZ kepada pelanggan saat ini adalah Data Center and Cloud Infrastructure, Enterprise Collaboration, Big Data & Analytics, Digital Business Management, Adaptive Security Architecture, dan Service yang memanfaatkan layanan TI (teknologi informasi). Permasalahan yang dihadapi PT XYZ adalah waktu pemulihan layanan TI ketika bencana belum sesuai dengan ekspektasi perusahaan. Hal ini dikarenakan kondisi infrastruktur TI belum bisa memenuhi kebutuhan layanan TI perusahaan.
Penelitian ini memfokuskan pada perancangan infrastruktur TI yang sesuai dengan kebutuhan pengelolaan layanan TI PT XYZ dengan menggunakan metodologi Architecture Development Method (ADM) dari The Open Group Architecture Framework (TOGAF). Teknik pengumpulan data untuk menyusun penelitian ini adalah dengan observasi, wawancara, dan studi literatur. Metodologi penelitian untuk menyusun penelitian ini adalah penelitian kualitatif menggunakan hermeneutics. Hasil dan kesimpulan dari penelitian ini adalah rancangan infrastruktur TI yang sesuai dengan kebutuhan pengelolaan layanan TI PT XYZ."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2018
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>