Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 30 dokumen yang sesuai dengan query
cover
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve...
Waltham, MA: Syngress, 2014
e20427738
eBooks  Universitas Indonesia Library
cover
As part of the Syngress basics series, The basics of cloud computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are...
Waltham, MA: Syngress, 2014
e20427739
eBooks  Universitas Indonesia Library
cover
Messier, Ric, author
It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut...
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks  Universitas Indonesia Library
cover
Andress, Jason, author
As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical...
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
Shimonski, Robert, author
Waltham, MA: Syngress, 2012
005.8 SHI c
Buku Teks  Universitas Indonesia Library
cover
Wheeler, Evan, author
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks  Universitas Indonesia Library
cover
Watson, Gavin, author
Social engineering attacks target the weakest link in an organization's security—human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social engineering penetration testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and...
Waltham, MA: Syngress, 2014
e20427714
eBooks  Universitas Indonesia Library
cover
Bathurst, Robert, author
Boston : Syngress , 2013
005.268 BAT h
Buku Teks  Universitas Indonesia Library
cover
Neely, Matthew, author
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can...
Amsterdam : Elsevier/Syngress, 2013
621.389 NEE w
Buku Teks  Universitas Indonesia Library
<<   1 2 3 >>