Search results
From OnnoCenterWiki
Jump to navigationJump to search
- * http://en.bookfi.org - e-book gratis * http://belajar.internetsehat.org/pustaka/ - berbagai e-book & ilmu khususnya [[Teknologi Informasi]] ...14 KB (1,834 words) - 01:58, 23 July 2017
- On large Linux login server, such as University or government research facility, one might find it useful to clear all counts every midni # crontab -e ...4 KB (597 words) - 19:38, 9 May 2017
- ...lui [[Internet]]. Transaksi melalui [[Internet]] ini dikenal dengan nama [[e-commerce]]. ...et juga memicu tumbuhnya transparansi pelaksanaan pemerintahan melalui [[e-government]]. ...7 KB (919 words) - 00:20, 21 November 2022
- ...e/ with 50,000+ participants, ~700 courses and educating 8000+ teachers on e-learning operating for over ten years. ...educational institutions, later becoming the role model for the Indonesian government for educational and universal Internet access. ...18 KB (2,633 words) - 20:45, 21 July 2021
- * [[Sejarah Internet Indonesia:e-banking|e-banking]] * [[Sejarah Internet Indonesia:e-government|e-government]] ...15 KB (1,778 words) - 03:53, 15 December 2024
- ...ternet service providers. Even machines that operate as a closed system (i.e., with no contact to the outside world) can be eavesdropped upon via monito ...aganda, sabotage, or spy on their targets. Many people believe the Russian government played a major role in the US presidential election of 2016 by using Twitte ...72 KB (10,349 words) - 02:43, 21 April 2025
- ..., when generating keys, you’ll typically be asked to provide the key size (e.g. 128-bit) you want to use for your encryption key ...be able to sniff this additional communication and learn the algorithm (i.e. the key) that was used to encrypt the plaintext; allowing them to decrypt ...64 KB (11,029 words) - 23:12, 25 October 2022
- ...a general term that can be used regardless of the form the data may take (e.g. electronic, physical).<ref>{{usc|44|3542}}(b)(1)</ref> ...ity, Integrity and Availability (CIA) of the information are not violated, e.g. ensuring that [[data]] is not lost when critical issues arise. These iss ...70 KB (9,855 words) - 06:49, 23 September 2021
- ...rnment of the United States|US government]] to support projects within the government and at universities and research laboratories in the US – but grew over tim ...http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-I.113-199706-I!!PDF-E |archive-date= 6 November 2012 }}</ref> A 2006 [[Organisation for Economic ...131 KB (18,170 words) - 01:57, 4 June 2021
- ...inty, [[Decision theory]] should be applied to manage risk as a science, i.e. rationally making choices under uncertainty. ...icy. On the contrary, Risk Assessment is executed at discrete time points (e.g. once a year, on demand, etc.) and – until the performance of the next as ...52 KB (7,299 words) - 06:48, 23 September 2021
- ...r unpredictable [[Root cause|root-cause]]. There are two types of events i.e. negative events can be classified as risks while positive events are class # determine the [[risk]] (i.e. the expected likelihood and consequences of specific types of attacks on s ...40 KB (5,954 words) - 20:26, 22 May 2017
- ...ough an automatic pay raise after you get the certification (common in the government). Knowing a scripting language (e.g., Python) ...77 KB (11,836 words) - 02:42, 19 February 2023