Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…
Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…
Terdapat indeks. Table of contents: Chapter 1: Introducing Network Scanning Chapter 2: Introducing Nmap Chapter 3: Using Nmap Chapter 4: Fingerprinting with Nmap Chapter 5: Detection and Evasion with Nmap Chapter 6: Scanning in the Real World Chapter 7: Tooling Around with Nmap Chapter 7: Nmap scanning in the real world
Terdapat indeks. Table of contents: Chapter 1. Client-Side Attacks Defined Client-Side Attacks: An Overview Types of Client-Side Attacks Chapter 2. Dissection of a Client-Side Attack What Constitutes a Client-Side Attack? Chapter 3. Protecting Web Browsers Common Functions of a Web Browser Microsoft Internet Explorer Mozilla Firefox Google Chrome Apple Safari Op…
Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…
Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…
Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…
Table of contents: Ch. 1. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Ch. 2. Regulating the Net: Free Expression and Content Controls Ch. 3. Intellectual Property in Cuberspace Ch. 4. Privacy in Cyberspace Ch. 5. Security and Crime in Cyberspace Ch. 6. Professional Ethics, Codes of Conduct, and Computer/Information Pro…