Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11 dokumen yang sesuai dengan query
cover
London: McGraw-HIll, 1993
005.8 ERN p
Buku Teks  Universitas Indonesia Library
cover
Lobel, Jerome
New York: McGraw-Hill, 1986
005.8 LOB f
Buku Teks  Universitas Indonesia Library
cover
Fakultas Ilmu Komputer Universitas Indonesia, 1997
S26989
UI - Skripsi Membership  Universitas Indonesia Library
cover
Hruska, Jan, 1957-
New York: Ellis Horwood, 1993
005.8 HRU c
Buku Teks  Universitas Indonesia Library
cover
Hartojo Salim
Yogyakarta: Andi, 1993
005.8 HAR v
Buku Teks  Universitas Indonesia Library
cover
Fitri Handayani
"Perubahan dalam industri adalah hal yang tidak dapat dihindari. Segala jenis perubahan dalam industri farmasi termasuk pada Haleon, baik dalam ukuran produksi, kontrol kualitas, kegiatan pergudangan hingga perubahan dalam kontrol akses dan manajemen keamanan password yang digunakan untuk mengakes sistem yang terdapat dalam industri, harus dipertanggung jawabkan melalui sistem manajemen pengendalian perubahan. Tujuan dari penulisan tugas khusus ini adalah mengidentifikasi gambaran manajemen untuk akses kontrol dan manajemen password sistem komputerisasi di PT Sterling Products Indonesia (Haleon) sesuai dengan ketentuan yang terdapat di CDOB. Pelaksanaan dan penulisan tugas khusus ini diawali dengan penjelasan dari validation manager dan membaca LSOP (Local Standard Operating Procedure) terkait dengan manajemen akses kontrol di Industri Haleon, kemudian membuat list table manajemen akses kontrol. Hasil yang diperoleh adalah manajemen akses kontrol dan manajemen password yang telah dikelola oleh PT Sterling Products Indonesia (Haleon) telah sesuai dengan ketentuan yang terdapat di CDOB baik dari segi dokumentasi, persyaratan yang harus dilakukan personil untuk memperoleh akses dan penggunaan password untuk mencegah hal-hal yang tidak diinginkan.
......
Change in the industry is inevitable. All types of changes in the pharmaceutical industry, including at Haleon, whether in production measures, quality control, warehousing activities to changes in access control and password security management used to access systems in the industry, must be accounted for through a change control management system. The purpose of writing this special assignment is to identify the management description for access control and computerized system password management at PT Sterling Products Indonesia (Haleon) in accordance with the provisions contained in CDOB. Implementing and writing this special assignment begins with an explanation from the validation manager and reading the LSOP (Local Standard Operating Procedure) related to access control management in the Haleon Industry, then creating a list of access control management tables. The results obtained are that access control management and password management which have been managed by PT Sterling Products Indonesia (Haleon) are in accordance with the provisions contained in CDOB both in terms of documentation, requirements that must be carried out by personnel to gain access and use of passwords to prevent things from happening. which is undesirable."
Depok: Fakultas Farmasi Universitas Indonesia, 2023
PR-PDF
UI - Tugas Akhir  Universitas Indonesia Library
cover
Fisher, Royal P.
Englewood Cliffs, NJ: Prentice-Hall, 1984
658.478 FIS i
Buku Teks  Universitas Indonesia Library
cover
Kuong, Javier F.
Englewood Cliffs, NJ: Prentice-Hall, 1987
005.8 KUO c
Buku Teks  Universitas Indonesia Library
cover
"Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.
The basics of digital privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.
The basics of digital privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy"
Waltham, MA: Syngress, 2014
e20427744
eBooks  Universitas Indonesia Library
cover
Faircloth, Jeremy
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester."
Waltham, Mass: Elsevier, 2011
005.8 FAI p
Buku Teks  Universitas Indonesia Library
<<   1 2   >>