Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4246 dokumen yang sesuai dengan query
cover
Maiwald, Eric
New York: McGraw-Hill Technology Education, 2004
005.8 MAI f
Buku Teks SO  Universitas Indonesia Library
cover
Amoroso, Edward G.
New Jersey : Prentice-Hall, 1994
005.8 AMO f
Buku Teks SO  Universitas Indonesia Library
cover
Peltier, Thomas
"Abstract:
"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis""
Boca Raton [Florida]: CRC Press, 2014
005.8 PEL i
Buku Teks  Universitas Indonesia Library
cover
White, Curt M.
"Summary:
Presents various aspects of data communications for future business managers, computer programmers, and system designers who need a thorough understanding of basic features, operations, and limitations of different types of computer networks"
New Zeland: Course Technology Cengage Learning, 2013
005.71 WHI f
Buku Teks SO  Universitas Indonesia Library
cover
Panko, Raymond R.
New Jersey : Prentice-Hall, 2004
005.8 PAN c
Buku Teks SO  Universitas Indonesia Library
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Kizza, Joseph Migga
Cham: Springer, 2017
005.8 KIZ g
Buku Teks SO  Universitas Indonesia Library
cover
"Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.
"
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
cover
Kizza, Joseph Migga
"We will focus on these three components in a computer network. But what is a computer network? The reader should be aware that our use of the phrase computer network , from now on, will refer to the traditional computer network.
A computer network is a distributed system consisting of loosely coupled computers and other devices. Any two of these devices, which we will from now on
refer to as network elements or transmitting elements without loss of generality, can
communicate with each other through a communication medium. In order for these connected devices to be considered a communicating network, there must be a set of communicating rules or protocols each device in the network must follow to communicate with another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short."
London: Springer-Verlag , 2015
e20528512
eBooks  Universitas Indonesia Library
cover
Stallings, William
New York: Prentice-Hall, 1995
005.8 STA n
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>