Termasuk bibliografi dan indeks. Contents Part one . Wireless ad hoc,Sensor and Mesh Networking 1. Introduction 2. Wireless Ad Hoc, Sensor and Mesh Networks 3. The Wireless Medium 4. Medium Access and error Control 5. Routing 6. Reliability, Flow and Congestion Control 7. Other Challenges and Security aspects Part Two. Security in Wireless Ad Hoc, Sensor and Mesh Networking…
Contents Chapter 1 Network security-yesterday, today, and tomorrow Chapter 2 Collaboration and web 2.0 technologies Chapter 3 Building relationships with web 2.0 Chapter 4 The cloud computing revolution Chapter 5 You’re in san jose , i’m in bangalore-lets’s meet Chapter 6 Watson, can ypu hear us ? Chapter 7 The consumerization of IT Chapter 8 The bad guys from outside : Malware…
Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …
Daftar Isi: BAB 1 PENDAHULUAN SEKURITI JARINGAN IP 1.1 Empat Layar Stack TCP/IP 1.2 Sekuriti Jaringan 1.3 Access Control 1.4 Sekuriti Dalam TCP/IP 1.5 Software dan Hardware IP Scurity Sico BAB 2 TRAFFIC FILTRING: SICO ISO ACCESS LIST 2.1 Mengenal Access List 2.2 Sekilas Konfigurasi Access List 2.3 Standard Access Liset 2.4 Extended Access List 2.5 Pengujian Dan Pemeriksaan…
Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…
Daftar isi: Pendahuluan KLASIFIKASI HONEYPOT 1. Low- interaction honeypot 2. High-interaction henoypot HENEWALL OVERVIEW HONEYNET Arsitektur PETUNJUKAN KONFIGURASI HONEYWALL Konfigurassi honeywall dan honeypot STATUS HONEYWALL ADMINISTARASI SISTEM OPOERASI HONETWALL DAFTAR FUSTAKA
Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …
Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…
Daftar isi: BAB 1 TEKNOLIGI PERBANKAN ATM Phone Banking SMS/M-Banking Internet Banking BAB 2 MENGENAL ATM Komponen ATM Software ATM Fasilitas Keamanan pada Software ATM Cara Kerja ATM Jenis-jenis ATM Produsen ATM BAB 3 KARTU ATM & KARTU KREDIT Anatomi Kartu ATM & Kartu Kredit Magnetic Stripe Nomor Kartu Memeriksa Nomor Kartu BAB 4 ATM SECURITY Card Trapping Stiker …
Daftar isi: 1. All about internet banking dkk (semua tentang internet babking dan kawan-kawannya 2. PIN dan kartu kredit pasangan yang pas 3. Menelusuri sistem internet banking 4. SQL injection onleh!!! KubiS (KUpas Abis) SQL injection 5. Bab yang cidak ada jwudwul