Daftar isi: Bab 1 Otak-atik jaringan dengan command prompt Bab 2 Menjelajah jaringan Bab 3 Otak-atik jaringan wireless Bab 4 Mencari sinyal kuat jaringan wireless Bab 5 Memutuskan koneksi internet komputer lain Bab 6 Menembus blokir internet dengan duplikasi MAC address Bab 7 Membuka jaringan wireless yang tersembunyi Bab 8 Mendeteksi spoofing Bab 9 Mengontrol bandwidth dan …
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…
Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…
Cybersecurity adalah kegiatan yang menjamin kerahasiaan, keutuhan dan ketersediaan informasi sehingga tetap aman. Keamanan siber juga merupakan upaya, aktivitas, atau tindakan multi pihak untuk melindungi akses jaringan, sistem, program, dan data dari berbagai ancaman siber atau akses ilegal Daftar Isi: BAGIAN 1 BAB 1. Pendahuluan Security BAB 2. Network Security BAB 3. Menyiapkan LAB Pr…
Buku ini menggabungkan bahan dari CWNA (Certified Wireless Network Administrator) yang merupakan sertifikasi internasional digabungkan dengan praktek sehari-hari agar apa yang anda pelajari bisa diimplementasikan Daftar Isi: BAB 1 Go wireless, wifi dan 802.11 BAB 2 Modus wi-fi BAB 3 Wireless modul Ad-Hoc BAB 4 Mengenal access pont (AP/WAP) BAB 5 Perhitungan kekuatan signel BAB 6…
Buku Sakti Wireless Hacking ini merupakan edisi revisi dari buku yang berjudul Step by Step Wireless Hacking . Pergantian judul dilakukan karena ada berbagai penambahan materi dan update lainnya. Tujuannya agar menjadi lebih fokus dan tepat sasaran dalam melakukan aksi wireless hacking. Melalui buku ini, Anda mempelajari bagaimana mencari, bahkan mengeksploitasi kelemahan yang ada pada jaringa…
Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…
Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…
Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…