Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…
Buku membahas tentang router cisco untuk membangun skill routing terutama pada penerapannya dengan menggnakan router cisco Daftar Isi: BAB I Rounter cisco BAB II Konfigurasi dasar BAB III Rounting BAB IV Static rounte BAB V RIP dasar BAB VI OSPF dasar BAB VII EIGRP dasar BAB VIII Konfigurasi WAN
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typi…
Agent Pendergast faces his most unexpected challenge yet when bloodless bodies begin to appear in Savannah, GA. A fabulous heist: On the evening of November 24, 1971, D. B. Cooper hijacked Flight 305--Portland to Seattle--with a fake bomb, collected a ransom of $200,000, and then parachuted from the rear of the plane, disappearing into the night...and into history. A brutal crime steeped in …
Macromedia Flash (sekarang Adobe Flash) merupakan perangkat lunak yang cukup ampuh dan mudah digunakan untuk membuat game segala tipe. Program Flash menyediakan tool untuk desain, juga ActionScript untuk pengodean yang memungkinkan pemunculan fitur-fitur kompleks dalam game yang Anda buat. Flash sangat unggul dalam meng-handle game-game kecil karena ringan dan hanya butuh satu file .exe. Dengan…
Koleksi ini tersedia di aplikasi MoLib Poltek SSN. Pengguna bisa mengunduh dan memasang melalui Google Play Store untuk versi Android, dan melalui tautan berikut untuk aplikasi Desktop (https://kubuku.id/download/e-library-sekolah-tinggi-sandi-negara) --------------------------------------------------------------------------------------------------------------------------------- Pajak merupak…
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool ev…
Table of contents PART I SECURING THE INFRASTRUCTURE Chapter 1 Infrastructure Security in the Real World Chapter 2 Understanding Access-Control and Monitoring Systems Chapter 3 Understanding Video Surveillance Systems Chapter 4 Understanding Intrusion-Detection and Reporting Systems Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises PART II SECURING LOCA…
For three-semester or four-quarter courses in Calculus for students majoring in mathematics, engineering, or science Clarity and precisionThomas' Calculus helps students reach the level of mathematical proficiency and maturity you require, but with support for students who need it through its balance of clear and intuitive explanations, current applications, and generalized concepts. In the 14t…