Penerapan Sistem Keamanan Informasi Pada Perusahaan PT. XYZ
(1) Politeknik LP3I Medan
Keywords
Full Text:
PDFReferences
Caelli W., Longley D., Shain M. Information Security Handbook Macmillan Publishers Ltd., 1991.
CNN, Insufficient computer security threatens doing business online http://www.cnn.com, 23 Februari 2000.
CNN, Highly classified' State Department computer missing http://www.cnn.com, 17 April 2000.
CNN, State Department missing 15 unclassified laptop computers http://www.cnn.com, 18 Mei 2000.
Kurniawan, Eko. Audit, Analisa dan Perancangan Infrastruktur Network Security - Studi Kasus: Mobile Internet Service Company, 2003.
Finne, T. Analyzing Information Security: Knowledge-Based DSS Approach Åbo Akademi University Institute for Advanced Management Systems Research Finland, 1996.
Rent-a-hacker http://www.rent-a-hacker.com, 2001.
Riyadi, Hendra. Pengembangan Kebijakan Kemananan Teknologi Informasi Jaringan Komputer pada PT. X, 2003.
ISO IEC TR 13335-3/1998. Information technology - Guidelines for the management of IT Security: Part 3: Techniques for the management of IT Security http://www.iso.ch , 1998.
International Standard ISO/IEC 17799, 2000.
ITSEC. Information Technology Security Evaluation Criteria Commission of European Communities, 1991.
Krutz, Ronald L., Vines, Russel Dean. The CISSP Prep Guide Wiley, 2001.
Raftery, J. Risk Analysis in Project Management, 1994.
Smith, M. R. Commonsense Computer Security, McGraw-Hill, 1993. 56
Stallings, W. Cryptography and Network Security, Third Edition Prentice Hall, 2002.
Syta, Jakub A. The Project of Information Security System based on ISO 17799 regulations for AVET INS Warsaw, 2001.
GAO, Executive Guide: Information Security Management United State General Accounting Office, 1998.
Vigilinx. White Paper: Security Assessment Methodology http://www.vigilinx.com, 2001.
DOI: https://doi.org/10.34007/incoding.v2i1.244
Article Metrics
Abstract view : 179 timesPDF - 363 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 INCODING: Journal of Informatics and Computer Science Engineering