Hasil Pencarian  ::  Kembali

Hasil Pencarian

Ditemukan 30 dokumen yang sesuai dengan query
cover
Dalziel, Henry, author
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP...
Waltham, MA: Syngress, 2015
e20480348
eBooks  Universitas Indonesia Library
cover
Andress, Jason, author
Summary : The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We...
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
cover
Sanders, Chris, author
Applied network security monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails....
Waltham, MA: Syngress, 2014
e20426799
eBooks  Universitas Indonesia Library
cover
Augmented reality law, privacy, and ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the...
Waltham, MA: Syngress, 2015
e20426800
eBooks  Universitas Indonesia Library
cover
Gardner, Bill, author
The best defense against the increasing threat of social engineering attacks is security awareness training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but building an security awareness program is the first book...
Waltham, MA: Syngress, 2014
e20426835
eBooks  Universitas Indonesia Library
cover
Snedaker, Susan, author
Powerful earthquake triggers tsunami in Pacific. Hurricane Isaac makes landfall in the Gulf Coast. Wildfires burn hundreds of houses and businesses in Colorado. Tornado touches down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals...
Waltham, MA: Syngress, 2014
e20426840
eBooks  Universitas Indonesia Library
cover
Messier, Ric, author
Collaboration with cloud computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses : - The...
Waltham, MA: Syngress, 2014
e20426883
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Andress, Jason, author
Cyber warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Waltham, MA: Syngress, 2014
e20426916
eBooks  Universitas Indonesia Library
cover
Johnson III, Leighton R., editor
Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are...
Waltham, MA: Syngress, 2014
e20426926
eBooks  Universitas Indonesia Library
<<   1 2 3   >>