Contents Foreword Introduction 1. Scope 2. Normative reference 3. Terms and definitions 4. Symbols and abbreviated terms 5. Structure 6. Overview 6.1 Background 6.2 Networks security planning 7. Identifying risk and preparing to identify security controls 7.1 Introduction 7.2 Information on current and/or planned networking 7.2.1 Security requirements in corporate information secu…
Daftar isi: Bab 1 Informasi buku, sistematika penulisan dan pendahuluan Bab 2 Mengenal jaringan komputer Bab 3 Application layer Bab 4 OTT (over the top) Bab 5 Peer to peer (P2P) Bab 6 Transport layer Bab 7 Network layer Bab 8 Data link layer Bab 9 Physical layer Bab 10 QoS (quality of service) Bab 11 Keamanan pada jaringan komputer Bab 12 Pelengkap praktik: perintah dasa…
IP Routing merupakan sebuah konsep yang tidak bisa terlepas dari perangkat yang dinamakan router. Sebuah perangkat router minimal harus bisa melakukan fungsi IP Routing tersebut. Selain itu terdapat fungsi-fungsi lain yang harus disediakan oleh perangkat router seperti membuat firewall, mengatur bandwidth, atau membuat jaringan VPN (Virtual Private Network). Daftar Isi: Bab 1 Konsep routing…
Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…
Kejahatan dunia maya adalah perbuatan merugikan orang lain yang dilakukan melalui jaringan informasi dari peralatan yang dilengkapi dengan internet seperti komputer, ponsel, dan lain-lain. Terdapat berbagai macam jenis kejahatan yang dapat terjadi di dunia maya, mulai dari peretasan, pencemaran nama baik, pelanggaran hak cipta, komentar jahat, dan lain sebagainya. Kejahatan dunia maya harus dih…
Daftar isi: 1. Pengenalan jaringan 2. Klasifikasi jenis jaringan 3. Perangkat jaringan 4. Virtual LAN (VLAN) 5. OSI model dan TCP/IP model 6. Subneting 7. Media jaringan komputer 8. IP address dan mac address 9. IP routing 10. Network address translation (NAT) 11. Keamanan jaringan 12. Networking tool 13. Troubleshooting 14. Manajemen jaringan Daftar pustaka
This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the context of a legacy data center design, detailing the problem statement for the particular technology a…
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …
Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…
Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…