Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…
Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…
Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test
DAFTAR ISI 1. Pendahuluan - Lingkp kajian HTN - Pengertian HTN dan hubungannya dengan HAN - Hubungan HTN dengan ilmu negara dan ilmu politik 2. Sumber-sumber hukum tata negara - Pengertian sumber hukum - Macam-macam sumber hukum - Sumber hukum tata negara - Hierarki Peraturan Peundang-undangan RI - Hierarki menurut UU No.10 Tahun 2004 - Hierarki menurut UU No.12 Tahun 2…
DAFTAR ISI BAB 1. Tentang Aplikasi Pariwisata 1.1. Alur Aplikasi Informasi Pariwisata pada Sisi Client 1.2. Alur Aplikasi Admin untuk Web Services 1.3. Prototype Aplikasi Android Pariwisata BAB 2. Perancangan Database Aplikasi Pariwisata 2.1. Struktur Database Aplikasi Pariwisata 2.2. Membuat Database Aplikasi Pariwisata di MySQL 2.3. Konvensi pada Database Aplikasi Pariwisata BA…
Table of contents: 1. Introduction 2. The technological landscape 3. Effect of information technology on productivity, employment and incomes 4. Changes in the nature of work and its organization 5. Data sources and methods 6. Finding and a path forward 7. Conclusion