Ditemukan 20 dokumen yang sesuai dengan query
Hadisurya Chandra Kusuma, author
Bencana telah menjadi sebuah isu penting di sektor Teknologi Informasi (TI) yang dapat terjadi kapan saja tanpa peringatan. Bencana pandemi yang terjadi saat ini, berdampak kepada kebutuhan akan mobilisasi dalam bekerja meningkat. Banyaknya instansi yang mengadopsi sistem outsourcing membuat jaringan informasi menjadi rentan terhadap ancaman serangan yang dapat berasal dari...
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership Universitas Indonesia Library
Yosua Praditya Suratman, author
Peningkatan jumlah serangan siber yang terjadi saat ini menandai bahwa Indonesia adalah sasaran empuk bagi aktor kejahatan di dunia siber. Serangan siber dipilih karena jauh lebih efektif dibandingkan serangan konvensional - militer, dan aktornya tidak terlihat. Belum lagi, kapasitas penanganan siber, baik infrastruktur, dana, maupun sumberdaya manusia-nya di Indonesia berbanding...
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal Universitas Indonesia Library
Yosua Praditya Suratman, author
The increasing number of cyber attacks that occur today indicates that Indonesia is an easy target for crime actors in the cyber world. Cyber attacks are selected because they are far more effective than conventional attacks - the military, and the actors are also invisible. Not to mention, the capacity...
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal Universitas Indonesia Library
Maengkom, Sera K., author
Notaris adalah pejabat publik yang diberi wewenang untuk membuat perbuatan autentik dan otoritas lainnya, otoritas yang mensertifikasi transaksi yang dilakukan secara elektronik, yang dikenal sebagai notaris dunia maya sebagaimana dijelaskan dalam penjelasan pasal 15, UU No. 2/2014 tentang Pejabat Notaris ( Revisi UU No. 30/2004). Kewenangan tersebut diikuti oleh kewajiban...
Depok: Fakultas Hukum Universitas Indonesia, 2019
T53930
UI - Tesis Membership Universitas Indonesia Library
Scherling, Mark, auhtor
New York: CRC Press, 2011
658.478 SCH p
Buku Teks Universitas Indonesia Library
"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- Provided by publisher...
Hershey, P.A.: Igi Global, 2014
005.8 ARC
Buku Teks Universitas Indonesia Library
Yun Q. Shi, editor
This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics...
Berlin: [, Springer-Verlag], 2012
e20410403
eBooks Universitas Indonesia Library
Wang, Jie, author
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks Universitas Indonesia Library
Messier, Ric, author
It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut...
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks Universitas Indonesia Library
The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in...
Berlin: Springer, 2012
e20398132
eBooks Universitas Indonesia Library