DAFTAR ISI Bagian I: Sistem telekomunikasi dan informatika A. Istilah dan pengertian telematika B. Sistem kerja telematika C. Kerangka hukum telematika D. Perbuatan yang dilarang menurut UU ITE Daftar bacaan Bagian II: Kejahatan siber A. Kejahatan dan teknologi B. Istilah, pengertian, dan ruang lingkup kejahatan siber C. Beberapa bentuk cyber crime D. Aturan hukum cyber crime E.…
Daftar isi: Bab I Globalisasi teknologi dan Globalisasi kejahatan A . Perkembangan kejahatan di era globalisasi informasi B . Kejahatan sebagai bagian dari dampak teknologi C . Globalisasi Kejahatan : Tantangan bagi indonesia Bab II Eksistensi Kejahatan Mayantara A . Pengertian internet dan sejarah dunia cyber B . Pengertian krimonologi, kejahatan, kejahatan mayantara (cyber crime) d…
Daftar isi: 1. Bahaya cybercrime dalam masyarakat 2. Kerangka dan konsep memerangi cybercrime dalam perspektif kriminologi 3. Keterkaitan kriminologi dan cybercrime 4. Pemanfaatan teori-teori kriminologi dalam memerangi cybercrime 5. Dimensi kriminologis cybercrime di Indonesia 6. Dimensi kriminologis cybercriminal di Indonesia 7. Analisis kriminologis terhadap upaya memerangi cybercrime…
Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…
Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…
Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…
1 Introduction 1 Jennifer Bayuk 2 The Complex World of Corporate CyberForensics Investigations 7 Gregory Leibolt 3 Investigating Large-Scale Data Breach Cases 29 J Andrew Valentine 4 Insider Threat Investigations 45 Shane Sims 5 Accounting Forensics 53 Tracy McBride 6 Analyzing Malicious Software 59 Lenny Zeltser 7 Network Packet Forensics 85 Eddie Schwartz 8 RAM and File …
This book is organized to facilitate students’ comprehension of the uses and operational aspects of the computer and its associated peripheral equipment. To accomplish this end, the text has been subdivided into six units as follows
THE NEXT WAR ZONE CONFRONTING THE GLOBAL THREAT OF CYBERTERRORISM JAMES F. DUNNIGAN CHAPTER 1: Cyberwar and You 1 Technical Terms You Might Not Recognize in This Chapter 1 Good News, Bad News 2 Bringing the War Home 5 Let’s Just Do It 6 The Bad Guys and What They Do 7 Cyberwar 10 The Major Unknown 13 The Most Likely Cyberwars 14 The Usual Suspects 15 What Can Be Done? 17 CHAPTER…
CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …