Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 30 dokumen yang sesuai dengan query
cover
Introduction to Cyber-warfare : a multidisciplinary approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military,...
Waltham, MA: Syngress, 2013
e20427002
eBooks  Universitas Indonesia Library
cover
Information security analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information security analytics dispels the myth that analytics within the information security domain is...
Waltham, MA: Syngress, 2015
e20427024
eBooks  Universitas Indonesia Library
cover
Many people think of the smart grid as a power distribution group built on advanced smart metering, but that?s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served...
Waltham, MA: Syngress, 2015
e20427026
eBooks  Universitas Indonesia Library
cover
Hacking and penetration testing with low power devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile...
Waltham, MA: Syngress, 2015
e20427047
eBooks  Universitas Indonesia Library
cover
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA compliance handbook, explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of certification and accreditation is discussed. This book walks the reader through the entire FISMA compliance...
Waltham, MA: Syngress, 2013
e20427059
eBooks  Universitas Indonesia Library
cover
Conrad, Eric, author
Eleventh hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts...
Waltham, MA: Syngress, 2014
e20427086
eBooks  Universitas Indonesia Library
cover
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of...
Oxford, UK: Syngress, 2015
e20427168
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
Managing information security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice...
Waltham, MA: Syngress, 2014
e20427185
eBooks  Universitas Indonesia Library
cover
Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise....
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
cover
Professional penetration testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find...
Waltham, MA: Syngress, 2013
e20427657
eBooks  Universitas Indonesia Library
<<   1 2 3   >>