Abstrak: Pengguna internet di seluruh dunia terus meningkat, termasuk di Indonesia. Namun, peningkatan ini tidak diimbangi dengan peningkatan kesadaran keamanan di kalangan masyarakat Indonesia. Hal ini menyebabkan maraknya serangan terhadap keamanan informasi, seperti social engineering. Social engineering adalah tindakan memengaruhi dan memanipulasi orang untuk membocorkan informasi sensiti…
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool ev…
Menulis untuk berbagai mata kuliah, teknik menulis cepat, membuat jurnal pembelajaran dan bagaimana tulisan anda dinilai.
Rekapitulasi serangan siber yang diterbitkan oleh Pusat operasi keamanan siber nasional Badan Siber dan Sandi Negara menunjukkan serangan yang diterima pada tahun 2021 dilakukan dengan metode serangan social engineering. Dalam mencegah serangan social engineering tersebut, maka diperlukan cara untuk meningkatkan kesadaran kemanan terhadap social engineering itu sendiri salah satunya dengan Educ…
Terdapat indeks. Table of Contents: Part One: About CMMI for Acquisition Chapter 1: Introduction Chapter 2: Process Area Components Chapter 3: Tying It All Together Chapter 4: Relationships Among Process Areas Chapter 5: Using CMMI Models Chapter 6: Essays on CMMI-ACQ in Government and Industry Part Two: Generic Goals and Generic Practices, and the Process Areas Part Three: The …
Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…
Table of Contents List of Perspectives xiii Preface xv Book Acknowledgments xxi Part One: About CMMI for Development 1 Chapter 1: Introduction 3 About Process Improvement 4 About Capability Maturity Models 9 Evolution of CMMI 10 CMMI Framework 14 CMMI for Development 18 Chapter 2: Process Area Components 19 Core Process Areas and CMMI Models 19 Required, Expected, and Info…
Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…
Daftar isi: 1 Pendahuluan 1.1 Perangkat Lunak 1.2 Rekayasa Perangkat Lunak 1.3 Proses Rekayasa Perangkat Lunak 1.4 Teknologi Informasi Sosial 2 Analisis dan Desain Sistem 2.1 Definisi Analisis Sistem 2.2 Teknik Pengumpulan Data 2.3 Jenis Kebutuhan 2.4 Definisi Desain Sistem 3 SDLC 3.1 Pengertian SDLC 3.2 Model SDLC 4 Basis Data 4.1 Pengerti…
Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…