Daftar isi: 1. Pengenalan jaringan 2. Klasifikasi jenis jaringan 3. Perangkat jaringan 4. Virtual LAN (VLAN) 5. OSI model dan TCP/IP model 6. Subneting 7. Media jaringan komputer 8. IP address dan mac address 9. IP routing 10. Network address translation (NAT) 11. Keamanan jaringan 12. Networking tool 13. Troubleshooting 14. Manajemen jaringan Daftar pustaka
This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the context of a legacy data center design, detailing the problem statement for the particular technology a…
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …
Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…
Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…
Panduan Lengkap Membangun Sistem Jaringan Komputer dengan Mikrotik RouterOS secara detail membahas tentang pengelolaan jaringan menggunakan RouterOS. Bahasan yang terkandung dalam buku ini cukup kompleks, namun disajikan dengan struktur kalimat yang mudah dimengerti secara teori dan juga dilengkapi dengan panduan langsung praktik sehingga materi akan lebih mudah dipahami. Selain pembahasan dan …
Buku ini ditulis dengan penuh pembaharuan, mengingat telah banyak perkembangan pengaturan hukum pelindungan data privasi baik secara internasional, regional maupun nasional. Rejim pengaturan data privasi telah berkembang dengan pesat baik di lingkup pemerintahan maupun swasta yang merupakan pihak yang memiliki kewajiban untuk dapat lebih melindungi data privasi individu, fenomena ini didorong d…
The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in y…
Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…