Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test
Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…
Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…
Daftar isi Bab 1 Melacak file tersembunyi File hidden Memeriksa file tersembunyi File super hidden Memburu file tersembunyi Bab 2 Mengatasi folder yang terkunci Membuka folder terlarang Membuka folder yang diproteksi aplikasi Bab 3 Mengendus CACLS & data streams Mengatasi CACLS Mendeteksi data streams Bab 4 Ngepet file Menyedot sisi flashdisk Membajak data CD-ROM …
Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends
Daftar isi: Bab 1 Validasi input 1.1 Validasi angka 1.2 Validasi string 1.3 Input yang membingungkan 1.4 Problema file Bab 2 Cross-site scripting 2.1 Enconding solution 2.2 Menangani atribut 2.3 Mengakali filter 2.4 Strip-tags () 2.5 Environtmen variables Bab 3 SQL injection 3.1 Magic quates 3.2 Ketepatan tipe data 3.3 Penyerangan like 3.4 SQL error handling 3.5 File inc…
Daftar isi: Bab I Aplikasi Antivirus Bab II Aplikasi Imaging System Bab III Aplikasi File Recovery Bab IV Aplikasi Dekstop Locker Bab V Aplikasi Perawatan Sistem Bab VI Aplikasi proteksi folder Bab VII Aplikasi Pop up blocker Bab VIII Aplikasi firewall Bab IX Aplikasi
Contents: Security analysis of a novel elliptic curve dynamic access control system VoIP SPAM response system adopting multi-leveled anti-SPIT solutions Feature extraction for IRIS recognition Bidirectional quantum secure direct communication based on entanglement Study and implementation of selinux-like access control mechanism based on linux Research on streaming dta integration syste…
Daftar isi: 1. Pendahuluan 2. Skema Sistem Notifikasi 3. Pemasangan 3.1 Kebutuhan Pemasangan 3.2 Pemasangan Melalui Kode Sumber 3.3 Pemasangan Melalui Repositori 4. Konfigurasi Kannel 5. Memulai kannel 5.1 Memulai Kannel Ala Debian 5.2 Memulai Kannel Kode Sumber 6. Uji Penggunaan Kannel 7. Membuat Ping Sederhana Sebagai Contoh Kasus 8. Membuat Pemonitoran Sederhana Dengan SNMP …