Contents: 1. Introduction 2. Radio Frequencies 3. Medium Access Control 4. Physical Layer 5. Cryptography 6. Wireless Security 7. Configuring Wireless Networks 8. Robust Security Network 9. MAC Layer Performance Analysis 10. Link Rate Adaptation 11. Build a Xen Server 12. Initial Configuration of Access-point Controllers
Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…
Table of Contents: chapter 0: Computer Science as a Career Path 1 chapter 1: Introduction to Computers, Problem Solving, and Programming 15 chapter 2: Overview of C++ 53 chapter 3: Top-Down Design with Functions and Classes 117 chapter 4: Selection Structures: if and switch Statements 197 chapter 5: Repetition and Loop Statements 259 chapter 6: Modular Programming 333 chapter 7: Simple …
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…
Table of contents: A. About the Author B. Dedication C. Acknowledgments D. Introduction 1. Introduction What Is the Raspberry Pi? What Can You Do with a Raspberry Pi? A Tour of the Raspberry Pi Setting Up Your Raspberry Pi Booting Up Summary 2. Getting Started Linux The Desktop The Int…
Contents: Chapter 1 Selecting an Operating System 1 What Is an OS? 1 Investigating User Interfaces 4 Where Does Linux Fit in the OS World? 8 What Is a Distribution? 13 Chapter 2 Understanding Software Licensing 21 Investigating Software Licenses 21 Looking at the Free Software Foundation 24 Looking at the Open Source Initiative 26 Looking at the Creative Commo…
Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…
Daftar isi: Bab 1. Pendahuluan 1.1 Pengertian Jaringan Komputer 1.2 Topologi Jaringan Komputer 1.3 Topologi Logika 1.4 Peralatan Network Bab 2. Model OSI dan Protocol TCP/IP 2.1 Apakah model OSI itu? 2.2 Model DARPA dan TCP/IP 2.3 ARP dan IP 2.4 Ipv4 Address 2.5 Ipv6 Address 2.6 Routing 2.7 Domain Name Systems (DNS) 2.8 Firewall dan Pendahuluan Security Bab 3. Membangun Ja…
Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…
Daftar isi: Bab 1 Pendahuluan Bab 2 Matriks dan aljabar linier Bab 3 Dasar-dasar grafik Bab 4 Penggunaan fungsi symbolic Bab 5 Pemrograman M File Bab 6 Transformasi Laplace Bab 7 Polinom Bab 8 Deret Fourier Bab 9 Animasi untuk kinematika getaran Bab 10 Curve fitting dan interpolasi Bab 11 Toolbox sistem kontrol Bab 12 Menggunakan perintah Help