Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 7735 dokumen yang sesuai dengan query
cover
Whitman, Michael E.
Boston: CENGAGE LEARNING CUSTOM, 2018
005.8 WHI p
Buku Teks SO  Universitas Indonesia Library
cover
Boehm, Franziska
"Current developments in EU internal security policy, such as increased information sharing (which includes the exchange of personal data between European law enforcement agencies and judicial actors in the area of freedom, security and justice (Europol, Eurojust, Frontex and OLAF)) and the access of EU agencies, in particular Europol and Eurojust, to data stored in European information systems such as the SIS (II), VIS, CIS or Eurodac raise interesting questions regarding the balance between the rights of individuals and security interests. This book deals with the complexity of the relations between these actors and offers for the first time a comprehensive overview of the structures for information exchange in the area of freedom, security and justice and their compliance with data protection rules in this field."
Berlin: Springer, 2012
e20400234
eBooks  Universitas Indonesia Library
cover
Graham, Benjamin, 1894-1976
New York, N.Y.: McGraw-Hill, 1962
332.63 GRA s
Buku Teks  Universitas Indonesia Library
cover
Stallings, William
New York: Pearson, 2018
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Slater, Ken
New York: Stockton Press, 1991
005.8 SLA i
Buku Teks SO  Universitas Indonesia Library
cover
Caeilli, William
New York: Macmillan, 1991
658.4 CAE i
Buku Teks  Universitas Indonesia Library
cover
Cohen, Frederick B.
New York: John Wiley & Sons, 1995
005.8 COH p
Buku Teks SO  Universitas Indonesia Library
cover
Calder, Alan
London: kogan page limited, 2005
005.8 CAL b (1)
Buku Teks  Universitas Indonesia Library
cover
Hershey: IRM Press, 2005
303.483 Inf
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"Managing information security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions."
Waltham, MA: Syngress, 2014
e20427185
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>