Terdapat bibliografi dan indeks. Table of contents: Pt. I General international law and cyberspace 1.Sovereignty 2.Due diligence 3.Jurisdiction 4.Law of international responsibility 5.Cyber operations not per se regulated by international law Pt. II Specialised regimes of international law and cyberspace 6.International human rights law 7.Diplomatic and consular law 8.Law of the …
Terdapat indeks. Table of Contents: Chapter 1 Introduction Chapter 2 A Single Variable: Shape and Distribution Chapter 3 Two Variables: Establishing Relationships Chapter 4 Time As a Variable: Time-Series Analysis Chapter 5 More Than Two Variables: Graphical Multivariate Analysis Chapter 6 Intermezzo: A Data Analysis Session Chapter 7 Guesstimation and the Back of the Envelope Chapte…
Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…
Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics
Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test
Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…
Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…
Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…
pt. ONE ABOUT THE CERT RESILIENCE MANAGEMENT MODEL 1.Introduction 1.1.The Influence of Process Improvement and Capability Maturity Models 1.2.The Evolution of CERT-RMM 1.3.CERT-RMM and CMMI Models 1.4.Why CERT-RMM is not a Capability Maturity Model 2.Understanding Key Concepts in CERT-RMM 2.1.Foundational Concepts 2.1.1.Disruption and Stress 2.1.2.Convergence 2.1.3.Managing Operatio…
Terdapat bibliografi dan indeks. Table of Contents Part I Programming in PL/SQL Chapter 1 Introduction to PL/SQL What Is PL/SQL? The Origins of PL/SQL So This Is PL/SQL About PL/SQL Versions Resources for PL/SQL Developers Some Words of Advice Chapter 2 Creating and Running PL/SQL Code Navigating the Database Creating and Editing Source Code SQL*Plus Performi…