Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4341 dokumen yang sesuai dengan query
cover
Andress, Jason
"Cyber warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors, our defenses must be ready all the time and our alert systems must detect the threats every time."
Waltham, MA: Syngress, 2014
e20426916
eBooks  Universitas Indonesia Library
cover
Boston: Elsevier, 2011
355.343 CYB
Buku Teks  Universitas Indonesia Library
cover
Winterfeld, Steve
"Contents :
Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed?"
Singapore: Elsiver , 2013
355.343 WIN b
Buku Teks  Universitas Indonesia Library
cover
"The basics of IT audit : purposes, processes, and practical information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements."
Waltham, MA: Syngress, 2014
e20427746
eBooks  Universitas Indonesia Library
cover
cover
"The basics of web hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.
The basics of web hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.
With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. "
Waltham, MA: Syngress, 2013
e20427748
eBooks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Washington: DC Westphalia Press, an imprint of the Policy Studies Organization, 2017
003.5 ISS
Buku Teks SO  Universitas Indonesia Library
cover
"Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy.
The basics of digital privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click.
The basics of digital privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy"
Waltham, MA: Syngress, 2014
e20427744
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>