Ditemukan 105 dokumen yang sesuai dengan query
Schiffman, Mike
New York : Wiley, 2003
005.8 SCH b
Buku Teks SO Universitas Indonesia Library
Rothke, Ben
New York: McGraw-Hill, 2003
005.8 ROT c
Buku Teks SO Universitas Indonesia Library
Petrocelli, Tom
New Jersey: Prentice-Hall, 2006
005.8 PET d
Buku Teks SO Universitas Indonesia Library
Dooley, Michael
Hoboken: IEEE Press, 2017
005.8 DOO d
Buku Teks SO Universitas Indonesia Library
New York : McGraw-Hill, 2011
005.8 GRA
Buku Teks SO Universitas Indonesia Library
Audun Josang, editor
"This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management."
Berlin: Springer, 2012
e20406998
eBooks Universitas Indonesia Library
Ramin Sadre, editor
"This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security."
Heidelberg: [, Springer], 2012
e20409186
eBooks Universitas Indonesia Library
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks SO Universitas Indonesia Library
Yogyakarta: Andi, 2011
658.4 IBI k
Buku Teks SO Universitas Indonesia Library
Broad, James
"The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization."
Waltham, MA: Syngress, 2013
e20427926
eBooks Universitas Indonesia Library