Ditemukan 35 dokumen yang sesuai dengan query
Bathurst, Robert
Boston : Syngress , 2013
005.268 BAT h
Buku Teks Universitas Indonesia Library
Shimonski, Robert
Waltham, MA: Syngress, 2012
005.8 SHI c
Buku Teks Universitas Indonesia Library
Andress, Jason
"
Summary :
The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book ...
"
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks Universitas Indonesia Library
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks Universitas Indonesia Library
Messier, Ric
"
It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one ...
"
Amsterdam : Syngress, 2014
305.8 MES c
Buku Teks Universitas Indonesia Library
Dalziel, Henry
"
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools, most ...
"
Waltham, MA: Syngress, 2015
e20480348
eBooks Universitas Indonesia Library
Sanders, Chris
"
Applied network security monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it ...
"
Waltham, MA: Syngress, 2014
e20426799
eBooks Universitas Indonesia Library
"
Augmented reality law, privacy, and ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching ...
"
Waltham, MA: Syngress, 2015
e20426800
eBooks Universitas Indonesia Library
Gardner, Bill
"
The best defense against the increasing threat of social engineering attacks is security awareness training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but building an security awareness program is the first book that shows you how to build a successful security awareness training program from the ground up.
Building an security awareness program provides you with a sound ...
"
Waltham, MA: Syngress, 2014
e20426835
eBooks Universitas Indonesia Library
Snedaker, Susan
"
Powerful earthquake triggers tsunami in Pacific. Hurricane Isaac makes landfall in the Gulf Coast. Wildfires burn hundreds of houses and businesses in Colorado. Tornado touches down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2nd edition of Business continuity and disaster recovery for IT professionals gives you the most up-to-date planning and risk management techniques ...
"
Waltham, MA: Syngress, 2014
e20426840
eBooks Universitas Indonesia Library