This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitiv…
Perangkat lunak sangat penting dan menyebar di dunia modern, tetapi akuisisi, pengembangan, pengoperasian, dan pemeliharaan perangkat lunak dapat melibatkan risiko besar, yang memungkinkan penyerang menyusup ke jutaan komputer setiap tahun. Buku terobosan ini memberikan panduan komprehensif yang unik untuk keamanan perangkat lunak, jauh melampaui pengkodean yang aman hingga menguraikan proses d…
Edisi ketiga ini merupakan revisi dari edisi sebelumnya. Buku Introduction to cryptography: with coding theory edisi ketiga memadukan aspek terapan dan teoretis untuk membangun fondasi yang kuat dalam kriptografi dan keamanan komputer. Penulis menginformasikan cakupan topik yang luas dari sudut pandang matematika, dan mencerminkan tren terbaru dalam bidang kriptografi yang berubah dengan cepat.…
This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error…
Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, ov…
Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…
We are heading into in a world everything is connected, everything is sensing, and everything is intelligent.
Buku ini ditulis dengan penuh pembaharuan, mengingat telah banyak perkembangan pengaturan hukum pelindungan data privasi baik secara internasional, regional maupun nasional. Rejim pengaturan data privasi telah berkembang dengan pesat baik di lingkup pemerintahan maupun swasta yang merupakan pihak yang memiliki kewajiban untuk dapat lebih melindungi data privasi individu, fenomena ini didorong d…