Terdapat indeks. Table of contents: 1. Getting started 2. Database security within the general security landscape and a defense-in-depth strategy 3. The database as a networked server 4. Authentication and password security 5. Application security 6. Using granular access control 7. Using the database to do too much 8. Securing database-to-database communications 9. Trojans 10. Enc…
Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…
DAFTAR ISI ARSITEKTUR KEAMANAN APLIKASI DAN SERVER DATABASE SECURE SOCKET LAYER Instalasi Secure Socket Layer Konfigurasi Secure Socket Layer Pembuatan Certificate of Authority (CA) Pembuatan Certificate Signing Request (CSR) Pengesahan CSR Oleh Certificate Authority REFERENSI FILE SERVER Instalasi Samba File Server Konfigurasi Samba File Server Pengaktifan Ulang Server SAMBA …
Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.