Buku ini menjelaskan tentang bagaimana membangun dinding pertahanan keamanan websiteyang baik. Juga dilengkapi dengan penjelasan tentang aplikasi, metode, dan penerapan konsepperetasan. Secara tak langsung, buku ini ibarat meminta pembaca (web developer dan pentester)untuk berpikir sebagai peretas atau penyerang. Daftar Isi Bab 1. Pendahuluan A. TCP/IP dan internet B. Standar TCP/IP dan p…
Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT profession…
Daftar isi: 1. Konsep dasar jaringan komputer 2. Standar, proses, dan sejarah 3. Konsep dasar protokol 4. Pengalamatan internet protokol 5. DNS (Domain Name System) 6. Routing 7. Web & mail server 8. Implementasi DNS 9. Implementasi routing IPv4 RedHat 10. Implementasi routing IPv4 Ubuntu 11. Implementasi routing IPv6 12. Implementasi MikroTIK RouterOS 13. Implementasi m…
"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…
"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of …
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…
Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …