DAFTAR ISI Modul 1 A. Dasar & Komponen Kontrol Akses B. Proses Akses Kontrol C. Tujuan Akses Kontrol (CIA) D. Akses Kontrol Berbasis Logik E. Tugas/latihan F. Pengayaan/praktikum Modul 2 A. Faktor Otentikasi B. Something You Know C. Something You Have D. Something You Are E. Tugas/latihan F. Pengayaan/praktikum Modul 3 A. Standar Penerapan Perangkat…
Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)
Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…
Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…
Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …
Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…
Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…
Preface. 1. Introduction. 2. Classical Cryptosystems. 3. Shift Register Sequences. 4. Block Ciphers. 5. Shannon Theory. 6. Data Compression Techniques. 7. Public-Key Cryptography. 8. Discrete Logarithm Based Systems. 9. RSA Based Systems. 10. Elliptic Curves Based Systems. 11. Coding Theory Based Systems. 12. Knapsack Based Systems. 13. Hash Codes & Authentication Tech…