Daftar isi: I. Pendahuluan II. Beberapa istilah (terminology) dan peranan statistik dalam penelitian III. Arti pengumpulan dan pengolahan data IV. Penyajian data V. Analisis data VI. Syarat penentuan teknik analisis data yang tepat dalam penelitian VII. Uji persyaratan analisis VIII. Diagram jalur (path diagram) konsep dasar IX. Sem (structural equation modell…
Judul asli Research Design Qualitative Quantitative, and Mix Methods Approoaches. Daftar isi: Bagian 1: pertimbangan-pertimbangan awal 1. Memilih rancangan penelitian Tiga jenis rancangan Tiga komponen penting dalam rancangan penelitian Pendekatan penelitian sebagai pandangan dunia, rancangan, dan metode Kriteria dalam memilih rancangan penelitian Ringkasan Bacaan tambahan 2. T…
Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…
Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …
Table of contents: pt. I Rethinking IT and Security ch. 1 Tectonic Shifts 1.1.Disruptive Forces 1.2.Deconstructing Cloud Computing 1.2.1.NIST Definition 1.2.2.The Three Service Models 1.2.3.The Four Deployment Models 1.3.The Rise of Mobility 1.4.New IT ch. 2 The Evolving Threat Landscape 2.1.From Cryptographers to World Leaders 2.2.The Changing Threat Landscape 2.3.Hacktivist…
Contents: 1. Introduction Information privacy, technology, and the law Information privacy law : origins and types Perspectives on privacy 2. Privasi and law enforcement The Fourth Amendment and emerging technology Federal electronic surveillance law Digital searches and seizures National security and foreign intelligence 3. Privacy and goverenment records and d…
Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion
Termasuk bibliografi dan indeks. CONTENTS: 1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear Block Codes. 5. Cyclic Codes. 6. Binary BCH Codes. 7. Nonbinary BCH Codes, Reed-Solomon Codes, and Decoding Algorithms. 8. Majority-Logic Decodable Codes. 9. Trellises for Linear Block Codes. 10. Reliability-Base…
Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpri…
Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …