Daftar isi: 1. Pendahuluan 2. Skema Sistem Notifikasi 3. Pemasangan 3.1 Kebutuhan Pemasangan 3.2 Pemasangan Melalui Kode Sumber 3.3 Pemasangan Melalui Repositori 4. Konfigurasi Kannel 5. Memulai kannel 5.1 Memulai Kannel Ala Debian 5.2 Memulai Kannel Kode Sumber 6. Uji Penggunaan Kannel 7. Membuat Ping Sederhana Sebagai Contoh Kasus 8. Membuat Pemonitoran Sederhana Dengan SNMP …
Daftar isi: 1. PENDAHULUAN 1.1 Pendahuluan 1.2 Multimedia 1.3 Masalah keamanan 1.4 Ancaman keamanan 1.5 Aspek aspek keamanan komputer 2. PEMAHAMAN DASAR KEAMANAN MULTIMEDIA 2.1 Pendahuluan 2.2 Cryptography 2.3 Steganography 2.4 Digital watermarking 3. STEGANOGRAPHY 3.1 Pendahuluan 3.2 Sejarah steganography 3.3 Teknik steganography 3.4 Embeding methods 3.5 Method leaset 3…
Contents Chapter 1 Network security-yesterday, today, and tomorrow Chapter 2 Collaboration and web 2.0 technologies Chapter 3 Building relationships with web 2.0 Chapter 4 The cloud computing revolution Chapter 5 You’re in san jose , i’m in bangalore-lets’s meet Chapter 6 Watson, can ypu hear us ? Chapter 7 The consumerization of IT Chapter 8 The bad guys from outside : Malware…
Contents 1. Cryptography: an overview 1.1 Elementaru ciphers 1.2 Enigma 1.3 A review of modular arithmetic and Zn 1.4 The hill cipher 1.5 Attscks on the hill cipher 1.6 Feistel cipher and DES 1.7 A word about AES 1.8 Diffie-hellman public key exchange 1.9 RSA 1.10 Public key exchanges with a group 1.11 Public key exchange using elliptic curve 2. Quantum mechanics 2.1 Photo pol…
Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits
Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra
contents: - Prehistory of Cryptography - Conventional Cryptography - Dedicated Conventional Cryptographic Primitives - Conventional Security Analysis - Security Protocols with Conventional Cryptography - Algorithmic Algebra - Algorithmic Number Theory - Elements of Complexity Theory - Public Key Cryptography - Digital Signatures - Cryptographic Protocols - From Cryptography to Com…
Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …
Daftar Isi: BAB 1 PENDAHULUAN SEKURITI JARINGAN IP 1.1 Empat Layar Stack TCP/IP 1.2 Sekuriti Jaringan 1.3 Access Control 1.4 Sekuriti Dalam TCP/IP 1.5 Software dan Hardware IP Scurity Sico BAB 2 TRAFFIC FILTRING: SICO ISO ACCESS LIST 2.1 Mengenal Access List 2.2 Sekilas Konfigurasi Access List 2.3 Standard Access Liset 2.4 Extended Access List 2.5 Pengujian Dan Pemeriksaan…
Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…