Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…
Table of Contents Chapter 1 Networking Models What Is a Model? Why Use a Model? OSI Model Introducing TCP/IP Chapter 2 Ethernet Remember the Models Structure Ethernet Type II vs. 802.3 MAC Addresses—Another Look Ethernet Operation Shared Media Physical Layer Encoding Other Types of Signaling Topologies Final Th…
Table of Contents 1. Intro to Command Shell Scripting - Information in this Chapter - On Shell Scripting - UNIX, Linux, and OS X Shell Scripting - Bash Basics - Putting It All Together with Bash - Windows Scripting - PowerShell Basics - Putting it all together with PowerShell 2. Intro to Python - Information in this Chapter - What is Python? - W…
Daftar isi: BAB 1 Mengenal berbagai peralatan untuk membuat jaringan komputer BAB 2 Proses pembuatan jaringan komputer BAB 3 Konfigurasi jaringan komputer menggunakan MS windows BAB 4 Membuat jaringan internet BAB 5 Username dan password tiap-tiap komputer BAB 6 Membatasi penggunaan komputer BAB 7 Berbagai file (file sharing) BAB 8 Konsultasi internal antarjaringan komputer B…
Buku ini akan memberikan berbagai contoh kofigurasi sesuai kebutuhan Anda. Selain bersifat konseptual, buku ini juga bersifat praktis sehingga mudah dipahami oleh para pembacanya. Untuk itu, Anda dapat langsung mempraktikkan konfigurasi-konfigurasi yang dibahas menggunakan router. Jika router tidak dimiliki, Anda bias mempraktikkannya menggunakan router simulator yang banyak tersedia di Internet.
Buku ini merupakan pedoman panduan yang membahas cara membuat koneksi cepat ke internet dengan Cisco DSL Router, cara melindungi LAN dengan Cisco ASA Firewall, dan cara melakukan akses aman dari jauh dengan Cisco VPN.
Daftar isi: BAB 1 Introduction to wireless local area network (WLAN) BAB 2 Mikrotik wireless BAB 3 Basic service set BAB 4 Extended service set (ESS) BAB 5 Wireless distribution system (WDS) BAB 6 WDS mesh BAB 7 Controller access point system manager (CAPsMAN) BAB 8 User manager BAB 9 Best practice
Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …
Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…