Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…
Daftar isi: 1. All about internet banking dkk (semua tentang internet babking dan kawan-kawannya 2. PIN dan kartu kredit pasangan yang pas 3. Menelusuri sistem internet banking 4. SQL injection onleh!!! KubiS (KUpas Abis) SQL injection 5. Bab yang cidak ada jwudwul
Daftar isi: Pendahuluan Sembilan hal penting untuk diketahui Langkah 1: Pasang dan gunakan program anti-virus Langkah 2: Lakukan patch pada sistem anda Langkah 3: Hati-hati dalam membaca email dengan attachment Langkah 4: Pasang dan gunakan program firewall Langkah 5: Lakukan backups untuk file dan folder penting Langkah 6: Gunakan password yang kuat Langkah 7: Hati-hati ketika downl…
Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…
Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…
Daftar isi: 1. Welcome 2. Disable anti virus 3. Men-disable AVG 2014 4. Men-disable anti virus avira 5. Men-disable smadav 2014 6. Run as administrator 7. Kenalan dulu dengan IP address 8. Cara lain melihat IP dynamic 9. Kenalan juga dengan mac address 10. Scan lp dengan advanced IP scanner 11. Scan Ip dengan angry IP scanner 12. Cara mudah scan mac address 13. Mengintip password…
Daftar isi: BAB 1 Pendahuluan 1.1 Keylogger software vs. hardware 1.2 Tujuan memasang keylogger 1.3 Bagaimana keylogger dipasang BAB 2 Free keylogger 2.1 Free keylogger by iwansoft 2.2 Danusoft free keylogger 2.3 Family keylogger free 2.4 Home keylogger 2.5 Real free keylogger 2.6 Revealer keylogger free BAB 3 Trial keylogger 3.1 All in one keylogger 3.2 Soft activity keylog…
Daftar isi: BAB 1 Mengenal NMAP BAB 2 Network scanning BAB 3 Information gathering BAB 4 Web server scanning BAB 5 Mail server scanning BAB 6 Advanced scanning BAB 7 Membuat laporan
1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…
Daftar Isi Kata Pengantar vii Daftar Isi ix 1. BAB I MEMPERSIAPKAN INFRASTRUKTUR 1 2. BAB 2 BERKENALAN DENGAN SQL 15 2.1. Menggunakan phpMyAdmin / 21 2.1.1. Membuat Database / 22 2.1.2. Membuat Tabel / 22 2.1.3. Memasukkan Data / 24 2.1.4. Melihat isi label / 26 2.1.5. Export & Import Database / 28 2.1.6. Menghapus Tabel / 34 2.2. Menggunakan SQL dalam phpMyAdmin / 35 2.2.1. M…