Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …
DAFTAR ISI BAB 1 PENGENALAN KEAMANAN INFORMASI A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Keamanan Informasi D. Definisi Keamanan Informasi E. Konsep C.I.A. F. Beberapa Istilah dalam Keamanan Informasi G. Arsitektur Keamanan Informasi H. Keamanan dalam System Life Cycle I. Evaluasi / Soal Latihan BAB 2 URGENSI KEAMANAN INFORMASI A. Tujuan Pembelajaran B…
DAFTAR ISI BAB 1 Mengenal Keamanan Perimeter Jaringan A. Tujuan Pembelajaran B. Pendahuluan C. Terminologi D. Defense in Depth E. Studi Kasus Defense in Depth BAB 2 Firewall A. Tujuan Pembelajaran B. Pendahuluan C. Definisi Firewall D. Tujuan Firewall E. Teknik yang digunakan Firewall F. Arsitektur Firewall G. Tipe-tipe Firewall H. Praktikum Instalasi…
Daftar isi Bab 1 Deteksi Intrusi Web server Log server Intrusion Detection System (IDS) Metode deteksi Anomali protokol Jenis serangan yang dapat dideteksi IDS Data mining dan kaitannya dengan IDS Bab 2 Data mining Sejarah data mining Pengertian data mining Penerapan data mining Metode pembelajaran dalam data mining Peran dan funsi data mining Bab 3 Ba…
Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…
Table of contents: 1. Introduction Basic of intrusions and intrusion detection Introduction of intrusion detection systems Introduction to anomalies and signatures Anomaly detection systems Intrusion detection technology Techniques for intrusion detection 2. Literature study Intrusion detection systems Intrusion - Attackers and the attecked Dimensions of intrusion …
Terdapat bibliografi dan indeks. Table of contents: 1. Introduction 2. Computer security and intrusion detection 3. Alert correlation 4. Alert collection 5. Alert aggregation and verification 6. High-level alert structures 7. Large-scale correlation 8. Evaluation 9. Open issues 10. Conclusions.
Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…
Terdapat indeks. Table of Contents: 1. Getting Started 2. Implement Policies for Monitoring 3. Know Your Network 4. Select Targets for Monitoring 5. Choose Event Sources 6. Feed and Tune 7. Maintain Dependable Event Sources 8. Conclusion: Keeping It Real
Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics