Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends
Termasuk bibliografi dan indeks. Contents Part one . Wireless ad hoc,Sensor and Mesh Networking 1. Introduction 2. Wireless Ad Hoc, Sensor and Mesh Networks 3. The Wireless Medium 4. Medium Access and error Control 5. Routing 6. Reliability, Flow and Congestion Control 7. Other Challenges and Security aspects Part Two. Security in Wireless Ad Hoc, Sensor and Mesh Networking…
Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…
DAFTAR ISI: 1. Apache Web Server 2. Instalasi 3. Virtual Host 4. Apache SSL 5. Autentikasi menggunakan modul Auth Basic 6. Autentikasi menggunakan Modul Auth MySQL 7. Autentikasi menggunakan Modul Auth PgSQL 8. Mod Security 9. Installasi 10. Chroot Apache 11. Mengubah Server Signature pada Apache 12. Reverse Proxy pada Apache menggunakan Mod Proxy 13. Tips dan Trik pada Apache 14.…
Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …
Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…
Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…