::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 326 dokumen yang sesuai dengan query
cover
Contents : - Table of contents by author - Network security - Wireless security - Service-provider and enterprise business issues - Authentication and encryption - Regulation, standards, and protocols - Acronym guide ...
Chicago: International Engineering Consortium, 2004
e20442515
eBooks  Universitas Indonesia Library
cover
Shema, Mike, author
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious...
London: Elsevier , 2012
005.8 SHE h
Buku Teks  Universitas Indonesia Library
cover
cover
Sri Chusri Haryanti, author
[ABSTRAK
Meningkatnya keberadaan, ketersediaan, kemampuan dan konektifitas perangkat bergerak telah menghasilkan paradigma baru dalam komunikasi bergerak. Salah satunya adalah implementasi fungsionalitas grid computing pada jaringan mobile ad hoc, yang dewasa ini dikenal dengan mobile ad hoc grid. Mobile ad hoc grid memungkinkan node dalam jaringan mobile ad hoc berbagi sumber daya...
2014
D1948
UI - Disertasi (Membership)  Universitas Indonesia Library
cover
Benny, Daniel J, author
Machine generated contents note: 1.Importance of Culture Property Protection: Museums, Historic Sites, Archives, and Libraries Introduction Museums Private Museums Local Museums County Museums State Museums National Museums Military Museums Historic Sites Private, Local, and County Historic Sites State Historic Sites National Historic Sites Archives Private, Local, and County Archives State Archives National Archives Libraries Private Libraries Campus Libraries Local Libraries County Libraries State Libraries National Libraries Summary Bibliography 2.Security Threats to Museums, Historic Sites, Archives, and...
Boca Raton, FL : CRC Press, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
cover
Androulidakis, Iosif I., author
Mobile phone security and forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware...
New York: [, Springer], 2012
e20418401
eBooks  Universitas Indonesia Library
cover
Snedaker, Susan, author
Powerful earthquake triggers tsunami in Pacific. Hurricane Isaac makes landfall in the Gulf Coast. Wildfires burn hundreds of houses and businesses in Colorado. Tornado touches down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals...
Waltham, MA: Syngress, 2014
e20426840
eBooks  Universitas Indonesia Library
cover
Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive...
Waltham, MA: Chandos, 2015
e20426960
eBooks  Universitas Indonesia Library
cover
Lidya Desnawati, author
ABSTRAK
Pencahayaan pada malam hari yang tidak optimal mengakibatkan banyaknya kejahatan di area kampus yang terjadi pada malam hari. Kualitas pencahayaan dan pemberitaan mengenai isu kriminalitas yang terjadi di kampus mempengaruhi persepsi rasa aman di kampus. Selain kualitas pencahayaan, persepsi rasa aman juga dipengaruhi oleh karakter individu dan kondisi lingkungan. Penulisan...
2016
S63512
UI - Skripsi (Membership)  Universitas Indonesia Library
cover
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks  Universitas Indonesia Library