Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …
Judul Asli: Networking with microsoft TCP/IP Daftar isi: Bagian I: Konsep-konsep TCP/IP Bab 1 Pendahuluan Bab 2 Arsitektur TCP/IP Bab 3 Lapisan network access Bab 4 Lapisan internet Bab 5 Lapisan host-ke-host Bab 6 Lapisan aplikasi/proses Bagian II Implementasi Microsoft TCP/IP Bab 7 Pengenalan Microsoft TCP/IP Bab 8 Memasang TCP/IP pada computer windows NT Bab 9 Membangun jar…
Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits
Contents PART 1 Manager’s Guide to Implementing a Quality System 1 Defining Software Quality 1.1 Why bother with Quality? 1.2 Quality – What is it? 2 Managing a Quality Company 2.1 Dedication to Customer Satisfaction 2.2 Emphasis on Continuous Improvement 2.3 Treating Suppliers as Business Partners 2.4 Communication and Teamwork 2.5 Empowering Employees 2.6 Commitment by T…
Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …
Table of contents: 1.Introduction 2.Basic TCP Sockets 3.Of Names and Address Families 4.Using UDP Sockets 5.Sending and Receiving Data 6.Beyond Basic Socket Programming 7.Under the Hood 8.Socket Programming in C++
Contents: 1. Introduction 2. Security vocabulary 3. Software testing and changes in the security landscape 4. All trust is misplaced 5. Security testing considerations 6. Threat modeling and risk assessment processes 7. Personas and testing 8. Security test planning 9. Sample security considerations 10. Vulnerability case study : brute force browsing 11. Vulnerability case study : bu…
Termasuk bibliografi dan indeks. CONTENS: 1. Getting to know storyline 2 2. Creating new projects 3. Scenes and slides 4. Scenes and slides 5. Working with text 6. Adding graphics 7. Object properties 8. Arranging objects 9. Working with media 10. States & layers 11. Triggers 12. Advanced triggers & variables 13. Q…
Termasuk bibliografi dan indeks. CONTENS: 1. Getting to know articulate studio
Termasuk bibliografi dan indeks. CONTENS: 1. Getting to know captivate 2. Creating new projects 3. Adding and managing slides 4. Adding content objects 5. Audio and video 6. Managing objects 7. Actions & interactions 8. Editing software simulations 9. Variables & advanced actions 10. Questions & quizzes 11. Special tools & wiz…