Daftar isi: BAB 1 KONSEP DASAR KOMUNIKASI DATA Data dan komunikasi data Elemen elemen komunikasi data Terminal komunikasi data Kendala-kendala komunikasi data Implementasi komunikasi data Bentuk bentuk komunikasi data BAB 2 DATA DAN SINYAL Data dan sinyal analog Data dan sinyal digital Komponen komponen sinyal Pengkodean data Kode tujuh bit (ASCII) Kode 8 bit (kode EBCDIC) Ko…
Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …
Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…
Ceritified Internet Webmaster Exam 1D0-410 Contents Chapter 1. CIW Certification Exams 1 1.1. The exam situation / 2 1.2. Exam layout and design / 3 1.3. Exam focus / 5 1.4. CIW testing software recommendations / 5 1.5. Exam – taking concept / 6 1.6. Question handling strategies / 6 1.7. Judging yourself / 7 1.8. Additional resources / 7 Chapter 2. A General Networking Review …
Daftar Isi: Berdendang Bersama Internet Protocol Address-Season 1 0 - Bacalah Dulu 1 - Perkenalan Bermula 2 - Network Addressing-Ipv4 3 - IPV4 Address untuk Maksud Tertentu 4 - Proses Assign Address 5 - Bagian Dari Network Saya, Tidak ? 6 - Berhitung Address 7 - Classless Addressing 8 - KUHIP 9 - Testing Network Layer 10 - Simfoni Network Addressing Berkawan dengan …
Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …
Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…
Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…
Daftar isi : BAB 1 Dasar ipv6 BAB 2 Lebih dalam tentang ipv6 BAB 3 Tipe ipv6 address BAB 4 Cek sistem apakah siap ipv6 BAB 5 Konfigurasi interface BAB 6 Route jaringan BAB 7 Konfigurasi tunnel ipv6-in-ipv4 BAB 8 Konfigurasi tunnel ipv4-in-ipv6 atau ipv6-in-ipv6 BAB 9 Ipv6 debugging BAB 10 Konfigurasi ipv6 presisten & otomatis BAB 11 Konfigurasi ipv6 pada route openwrt BAB 12 Keamana…
Contents Chapter 1 Introduction Chapter 2 Domain 1: access control Chapter 3 Domain 2: telecommunicatons and network security Chapter 4 Domain 3: information security governance and risk management Chapter 5 Domain 4: software development security Chapter 6 Domain 5: cryptography Chapter 7 Domain 6: security architecture and design Chapter 8 Domain 7: operations security Chapter 9 Do…