Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…
CONTENTS: 1. Building a Hardware and Software Test Platform 2. Passive Information Gathering 3. Analyzing Network Traffic 4. Detecting Live Systems and Analyzing Results 5. Enumerating Systems 6. Automating Encryption and Tunneling Techniques 7. Automated Attack and Penetration Tools 8. Securing Wireless Systems 9. An Introduction to Malware 10. Detecting Intrusions and Analyzing Malw…
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…
Contents: PART I THE BASICS Chapter 1 Introduction and overview Chapter 2 Foundational security and access control concepts Chapter 3 How electronic access control systems work PART II HOW THINGS WORK Chapter 4 Access control credentials and credential readers Chapter 5 Types of access controlled portals Chapter 6 Life safety and exit devices Chapter 7 Door types and door f…
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Contents: Part I Setting the stage 1 Digital signatures: beckground and definitions 2 Cryprographic harness assumptions Part II Digital signature schemes without random oracles 3 Constructions based on general assumptions 4 Signature schemes based on the (strong) RSA assumption 5 Constructions based on bilinear maps Part III Digital signature shemes in the random oracle model 6 T…
Table of Contents: 1. Introduction 2. Access Control Fundamentals 3. Multics 4. Security in Ordinary Operating Systems 5. Verifiable Security Goals 6. Security Kernels 7. Securing Commercial Operating Systems 8. Case Study: Solaris Trusted Extensions 9. Case Study: Building a Secure Operating System for Linux 10. Secure Capability Systems 11. Secure Virtual Machine Systems …
Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…
Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…