::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 101 dokumen yang sesuai dengan query
cover
Messier, Ric, author
Collaboration with cloud computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses : - The...
Waltham, MA: Syngress, 2014
e20426883
eBooks  Universitas Indonesia Library
cover
Johnson III, Leighton R., editor
Computer incident response and forensics team management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are...
Waltham, MA: Syngress, 2014
e20426926
eBooks  Universitas Indonesia Library
cover
Introduction to Cyber-warfare : a multidisciplinary approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military,...
Waltham, MA: Syngress, 2013
e20427002
eBooks  Universitas Indonesia Library
cover
Akhgar, Babak, editor
Emerging trends in ICT security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with...
Waltham, MA: Morgan Kaufmann, 2014
e20427082
eBooks  Universitas Indonesia Library
cover
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve...
Waltham, MA: Syngress, 2014
e20427738
eBooks  Universitas Indonesia Library
cover
Singapore: World Scientific, 2010
R 658.478 HAN
Buku Referensi  Universitas Indonesia Library
cover
McCarthy, N.K., author
New York: McGraw-Hill, 2012
005.8 MCC c
Buku Teks  Universitas Indonesia Library
cover
Shema, Mike, author
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious...
London: Elsevier , 2012
005.8 SHE h
Buku Teks  Universitas Indonesia Library
cover
Budi Gunawan, author
Jakarta: PT. Gramedia Pustaka Utama, 2018
001.95 BUD k
Buku Teks  Universitas Indonesia Library
cover
The basics of web hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to...
Waltham, MA: Syngress, 2013
e20427748
eBooks  Universitas Indonesia Library
<<   5 6 7 8 9 10 11   >>