Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …
Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …
Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip …
Daftar isi: 1 Pengantar Kriptografi dan Keamanan Jaringan 2 Kriptografi Klasik 3 Matematika untuk Kriptografi Kunci Simetri 4 Data Encryption System (DES) 5 Advanced Encryption Standard (AES) 6 Mode Operasi, dan Sistem Sandi Stream 7 Teori Bilangan untuk Kriptografi Kunci Publik 8 Sistem Kriptografi Kunci Publik 9 Fungsi Hash untuk Kriptografi 10 Digital Signature
Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filt…
DAFTAR ISI: 1. Pendahuluan Komunikasi Aspek-aspek keamanan Algoritma dan kunci Cryptanalysis Macam-macam algoritma kriptografi Macam-macam serangan cryptanalyst Keamanan algoritma 2. Algoritma kriptografi klasik Teknik subtitusi Subtitusi deret campuran kata kunci Subtitusi monomer-dinome-trinome Subtitusi multilatera…
Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …
Table of contents Section 1 Security to date 1. What Is Security Convergence? 2. Why sould you care? 3. Cultural differences Section 2 THe changing of the guard 4. Changing the threat paradigm 5. The Changing Security Environment 6. The Changing Business Model 7. The Ever-Advancing Micro Chip 8. Leveraging Technology Section 3 The new world 9. Disruptive Technology a…
Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…