Daftar isi: Pendahuluan KLASIFIKASI HONEYPOT 1. Low- interaction honeypot 2. High-interaction henoypot HENEWALL OVERVIEW HONEYNET Arsitektur PETUNJUKAN KONFIGURASI HONEYWALL Konfigurassi honeywall dan honeypot STATUS HONEYWALL ADMINISTARASI SISTEM OPOERASI HONETWALL DAFTAR FUSTAKA
DAFTAR ISI: 1. Apache Web Server 2. Instalasi 3. Virtual Host 4. Apache SSL 5. Autentikasi menggunakan modul Auth Basic 6. Autentikasi menggunakan Modul Auth MySQL 7. Autentikasi menggunakan Modul Auth PgSQL 8. Mod Security 9. Installasi 10. Chroot Apache 11. Mengubah Server Signature pada Apache 12. Reverse Proxy pada Apache menggunakan Mod Proxy 13. Tips dan Trik pada Apache 14.…
Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …
Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…
Daftar isi: BAB 1 TEKNOLIGI PERBANKAN ATM Phone Banking SMS/M-Banking Internet Banking BAB 2 MENGENAL ATM Komponen ATM Software ATM Fasilitas Keamanan pada Software ATM Cara Kerja ATM Jenis-jenis ATM Produsen ATM BAB 3 KARTU ATM & KARTU KREDIT Anatomi Kartu ATM & Kartu Kredit Magnetic Stripe Nomor Kartu Memeriksa Nomor Kartu BAB 4 ATM SECURITY Card Trapping Stiker …
DAFTAR ISI ARSITEKTUR KEAMANAN APLIKASI DAN SERVER DATABASE SECURE SOCKET LAYER Instalasi Secure Socket Layer Konfigurasi Secure Socket Layer Pembuatan Certificate of Authority (CA) Pembuatan Certificate Signing Request (CSR) Pengesahan CSR Oleh Certificate Authority REFERENSI FILE SERVER Instalasi Samba File Server Konfigurasi Samba File Server Pengaktifan Ulang Server SAMBA …
Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…
Contents: Introduction Entity-Level Policies and Procedures Access-Control Policies and Procedures Change Control and Change Management System Information Integrity and Monitoring System Services Acquisition and Protection Informational Asset Management Continuity of Operations Appendices: ISO / IEC 27001 (Annex A) Controls(c) ISO NIST S P 800-53 Controls HIPAA Security R…
Daftar isi: 1. All about internet banking dkk (semua tentang internet babking dan kawan-kawannya 2. PIN dan kartu kredit pasangan yang pas 3. Menelusuri sistem internet banking 4. SQL injection onleh!!! KubiS (KUpas Abis) SQL injection 5. Bab yang cidak ada jwudwul
Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…