::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 326 dokumen yang sesuai dengan query
cover
Peeter Laud, editor
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on...
Berlin: [, Springer-Verlag], 2012
e20409702
eBooks  Universitas Indonesia Library
cover
This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of...
Heidelberg: Springer, 2012
e20410397
eBooks  Universitas Indonesia Library
cover
Yun Q. Shi, editor
This special issue contains five selected papers that were presented at the Workshop on Pattern Recognition for IT Security, held in Darmstadt, Germany, in September 2010, in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition, DAGM 2010. It demonstrates the broad range of security-related topics...
Berlin: [, Springer-Verlag], 2012
e20410403
eBooks  Universitas Indonesia Library
cover
Nora Cuppens-Boulahia, editor
This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from...
Heidelberg: [Springer, ], 2012
e20410416
eBooks  Universitas Indonesia Library
cover
Yun Q. Shi, editor
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus...
Berlin: [Springer-Verlag, ], 2012
e20410498
eBooks  Universitas Indonesia Library
cover
Sanders, Chris, author
Applied network security monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails....
Waltham, MA: Syngress, 2014
e20426799
eBooks  Universitas Indonesia Library
cover
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many...
Waltham, MA: Morgan Kaufmann, 2013
e20426927
eBooks  Universitas Indonesia Library
cover
Many people think of the smart grid as a power distribution group built on advanced smart metering, but that?s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served...
Waltham, MA: Syngress, 2015
e20427026
eBooks  Universitas Indonesia Library
cover
Johnson, Rob, author
Sudbury, MA: Jones &​ Bartlett Learning, 2015
658.403 8 JOH s
Buku Teks  Universitas Indonesia Library
cover
Yohan Suryanto, author
ABSTRAK
Perkembangan komputer kuantum, M2M, dan IoT meningkatkan kebutuhan ruang kunci sistem enkripsi. Selain itu, pertukaran citra menggunakan media sosial dalam jaringan non error free menuntut adanya metode enkripsi yang cepat sekaligus tahan terhadap gangguan. Peta chaotic memiliki karakteristik yang sesuai untuk enkrispi citra. Namun, peta chaotic yang ada menghadapi masalah...
2017
D1709
UI - Disertasi (Membership)  Universitas Indonesia Library