Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures
--
Table of contents 1. A Crawler Guard for Quickly Blocking Unauthorized Web Robot 2. Privacy Preserving for Location-Based Services Using Location Transformation 3. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux 4. Multiple-Bank E-Cash without Random Oracles 5. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy 6. Preserving User Priv…
Contents Chapter 1. Virtualization Chapter 2. SDN (software-defined networking) Chapter 3. Smart edges Chapter 4. New-generation protocols Chapter 5. Mobile cloud networking and mobility control Chapter 6. Wi-fi and 5G Chapter 7. Security Chapter 8. Concrezation and morphware
Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …
Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Daftar isi: Bab 1. Pendahuluan 1.1 Pengertian Jaringan Komputer 1.2 Topologi Jaringan Komputer 1.3 Topologi Logika 1.4 Peralatan Network Bab 2. Model OSI dan Protocol TCP/IP 2.1 Apakah model OSI itu? 2.2 Model DARPA dan TCP/IP 2.3 ARP dan IP 2.4 Ipv4 Address 2.5 Ipv6 Address 2.6 Routing 2.7 Domain Name Systems (DNS) 2.8 Firewall dan Pendahuluan Security Bab 3. Membangun Ja…
Daftar isi 1. Switch Cisco 1.1 Cara kerja perangkat switch 2. VLAN (Virtual LAN) 2.1 Apa itu VLAN 2.2 Konsep VLAN 2.3 Mode port switch 2.4 Menyisipkan informasi VLAN ID (VID) 2.5 Tipe VLAN 3. VTP (Virtual Trunking Protokol) 3.1 Apa itu VTP 3.2 Kenapa perlu menggunakan VTP 4. Inter-VLAN routing 4.1 Inter-VLAN routing 4.2 Inter-VLAN routing menggunakan switch layer 3 4.3 Pros…