Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …
Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Daftar isi: Bab 1. Pendahuluan 1.1 Pengertian Jaringan Komputer 1.2 Topologi Jaringan Komputer 1.3 Topologi Logika 1.4 Peralatan Network Bab 2. Model OSI dan Protocol TCP/IP 2.1 Apakah model OSI itu? 2.2 Model DARPA dan TCP/IP 2.3 ARP dan IP 2.4 Ipv4 Address 2.5 Ipv6 Address 2.6 Routing 2.7 Domain Name Systems (DNS) 2.8 Firewall dan Pendahuluan Security Bab 3. Membangun Ja…
Daftar isi 1. Switch Cisco 1.1 Cara kerja perangkat switch 2. VLAN (Virtual LAN) 2.1 Apa itu VLAN 2.2 Konsep VLAN 2.3 Mode port switch 2.4 Menyisipkan informasi VLAN ID (VID) 2.5 Tipe VLAN 3. VTP (Virtual Trunking Protokol) 3.1 Apa itu VTP 3.2 Kenapa perlu menggunakan VTP 4. Inter-VLAN routing 4.1 Inter-VLAN routing 4.2 Inter-VLAN routing menggunakan switch layer 3 4.3 Pros…
DAFTAR ISI Bagian I: Sistem telekomunikasi dan informatika A. Istilah dan pengertian telematika B. Sistem kerja telematika C. Kerangka hukum telematika D. Perbuatan yang dilarang menurut UU ITE Daftar bacaan Bagian II: Kejahatan siber A. Kejahatan dan teknologi B. Istilah, pengertian, dan ruang lingkup kejahatan siber C. Beberapa bentuk cyber crime D. Aturan hukum cyber crime E.…
Daftar isi: BAB 1 Pendahuluan 1.1 Pengertian VPN 1.2 Perkembangan VPN 1.3 Aplikasi VPN 1.4 Protokol-protokol VPN 1.5 Tunneling 1.6 Freeswan project BAB 2 Instalasi debian GNU/Linux 2.1 Pendahuluan 2.2 Nilai minus debian 2.3 Mengapa memilih debian 2.4 Kebutuhan hardware debian 2.5 Persiapan sebelum instalasi debian 2.6 Memperoleh media system instalasi debian 2.7 Boot sistem …
Daftar isi: BAB 1 Konsep dasar jaringan komputer BAB 2 Standar, proses dan sejarah BAB 3 Konsep dasar protokol BAB 4 Pengalamatan internet protocol BAB 5 DNS (domain name systrm) BAB 6 Routing BAB 7 Implementasi DNS BAB 8 Implementasi routing IPv4 BAB 9 Implementasi roumting IPc6 BAB 10 Ringkasan
Daftar isi: BAB 1 Pendahuluan BAB 2 DNS server BAB 3 Web server BAB 4 Samba server BAB 5 FTP server BAB 6 SSH server dan SCP BAB 7 Clam antivirus server BAB 8 Network monitoring BAB 9 DHCP server BAB 10 Firewall BAB 11 NFS server BAB 12 Proxy server BAB 13 Mail server
Daftar isi: Mengenal windows NT server 4.0 User account: group, domain, dan trust relationships Mengelola domain dan trust relationship Pengelolaan user dan group Berbagi pakai drive, direktori, dan file Penggunaan dan pengelolaan printer Menggunakan client windows dan DOS Menggunakan client windows NT Konfigurasi hardware server Pengelolaan server Konfigurasi jaringan dan pengelol…