vi CONTENTS3.8 Case Study: Security Problems for ATM Systems 993.9 Rec terjemahan - vi CONTENTS3.8 Case Study: Security Problems for ATM Systems 993.9 Rec Bahasa Indonesia Bagaimana mengatakan

vi CONTENTS3.8 Case Study: Security

vi CONTENTS
3.8 Case Study: Security Problems for ATM Systems 99
3.9 Recommended Reading and Web Sites 101
3.10 Key Terms, Review Questions, and Problems 103
Chapter 4 Access Control 105
4.1 Access Control Principles 106
4.2 Subjects, Objects, and Access Rights 110
4.3 Discretionary Access Control 111
4.4 Example: UNIX File Access Control 118
4.5 Role-Based Access Control 121
4.6 Case Study: RBAC System for a Bank 129
4.7 Recommended Reading and Web Site 132
4.8 Key Terms, Review Questions, and Problems 133
Chapter 5 Database Security 137
5.1 The Need for Database Security 138
5.2 Database Management Systems 139
5.3 Relational Databases 141
5.4 Database Access Control 144
5.5 Inference 149
5.6 Statistical Databases 152
5.7 Database Encryption 162
5.8 Cloud Security 166
5.9 Recommended Reading and Web Site 172
5.10 Key Terms, Review Questions, and Problems 173
Chapter 6 Malicious Software 178
6.1 Types of Malicious Software (Malware) 179
6.2 Propagation—Infected Content—Viruses 182
6.3 Propagation—Vulnerability Exploit—Worms 188
6.4 Propagation—Social Engineering—SPAM E-mail, Trojans 195
6.5 Payload—System Corruption 197
6.6 Payload—Attack Agent—Zombie, Bots 199
6.7 Payload—Information Theft—Keyloggers, Phishing, Spyware 201
6.8 Payload—Stealthing—Backdoors, Rootkits 202
6.9 Countermeasures 206
6.10 Recommended Reading and Web Sites 215
6.11 Key Terms, Review Questions, and Problems 216
Chapter 7 Denial-of-Service Attacks 220
7.1 Denial-of-Service Attacks 221
7.2 Flooding Attacks 228
7.3 Distributed Denial-of-Service Attacks 230
7.4 Application-Based Bandwidth Attacks 232
7.5 Reflector and Amplifier Attacks 234
7.6 Defenses Against Denial-of-Service Attacks 239
7.7 Responding to a Denial-of-Service Attack 243
7.8 Recommended Reading and Web Sites 244
7.9 Key Terms, Review Questions, and Problems 245
0/5000
Dari: -
Ke: -
Hasil (Bahasa Indonesia) 1: [Salinan]
Disalin!
VI isi3,8 studi kasus: masalah keamanan untuk sistem ATM 993.9 dianjurkan membaca dan situs Web 1013.10 istilah kunci, meninjau pertanyaan dan masalah 103Bab 4 Access Control 1054.1 prinsip kontrol akses 1064.2 subyek, obyek, dan hak akses 1104.3 kontrol akses discretionary 1114.4 contoh: UNIX File Access Control 1184.5 kontrol akses berbasis peran 1214.6 studi kasus: RBAC sistem untuk Bank 1294.7 dianjurkan membaca dan situs Web 1324.8 istilah kunci, meninjau pertanyaan dan masalah 133Bab 5 keamanan Database 1375.1 perlunya keamanan Database 1385.2 sistem manajemen database 1395.3 database relasional 1415.4 database Access Control 1445.5 kesimpulan 1495.6 Statistik database 1525.7 database enkripsi 1625.8 cloud keamanan 1665.9 dianjurkan membaca dan situs Web 1725.10 istilah kunci, meninjau pertanyaan dan masalah 173Perangkat lunak berbahaya Bab 6 1786.1 jenis perangkat lunak berbahaya (Malware) 1796.2 propagasi — terinfeksi konten — virus 1826.3 propagasi — mengeksploitasi kerentanan — cacing 1886.4 propagasi — rekayasa sosial — SPAM E-mail, Trojans 1956.5 payload — sistem korupsi 1976.6 payload — menyerang agen — Zombie, Bots 1996.7 payload — Informasi Pencurian — Keyloggers, Phishing, Spyware 2016.8 payload — Stealthing — Backdoors, rootkit 2026.9 penanggulangan 2066.10 dianjurkan membaca dan situs Web 2156.11 istilah kunci, meninjau pertanyaan dan masalah 216Bab 7 Denial-of-Service serangan 2207.1 denial-of-Service serangan 2217.2 banjir serangan 2287.3 didistribusikan Denial-of-Service serangan 2307.4 aplikasi Bandwidth berbasis serangan 2327,5 reflektor dan penguat serangan 2347.6 pertahanan terhadap serangan Denial-of-Service 2397,7 menanggapi serangan Denial-of-Service 2437.8 dianjurkan membaca dan situs Web 2447,9 istilah kunci, meninjau pertanyaan dan masalah 245
Sedang diterjemahkan, harap tunggu..
Hasil (Bahasa Indonesia) 2:[Salinan]
Disalin!
vi ISI
3.8 Studi Kasus: Masalah Keamanan untuk ATM Sistem 99
3.9 Membaca dan Web Situs 101 Direkomendasikan
3.10 Syarat Key, Tinjau Pertanyaan, dan Masalah 103
Bab 4 Access Control 105
Prinsip 4.1 Access Control 106
4.2 Subjek, Objek, dan Hak Akses 110
4.3 Discretionary Access Control 111
4.4 Contoh: UNIX file Access Control 118
4.5 Peran Berbasis Access Control 121
4.6 Studi Kasus: Sistem RBAC bagi Bank 129
4.7 Rekomendasi Membaca dan Web Site 132
4.8 Syarat Key, Tinjau Pertanyaan, dan Masalah 133
Bab 5 Database Security 137
5.1 Kebutuhan Keamanan Database 138
5.2 Basis Data Sistem Manajemen 139
5.3 Relational Database 141
5.4 Basis Data Access Control 144
5.5 Inferensi 149
5.6 Statistik Database 152
5.7 Basis Data Encryption 162
5.8 Cloud Security 166
5.9 Rekomendasi Membaca dan Web Site 172
5.10 Syarat Key, Tinjau Pertanyaan, dan Masalah 173
Bab 6 Malicious Software 178
6.1 Jenis Perangkat Lunak Berbahaya (Malware) 179
6.2 Perbanyakan-terinfeksi Content-Virus 182
6.3 Perbanyakan-Kerentanan Exploit-Worms 188
6.4 Perbanyakan-Sosial Teknik-SPAM E-mail, Trojan 195
6,5 Payload-Sistem Korupsi 197
6.6 Payload-Attack Agen-Zombie, Bot 199
6.7 Payload-Informasi Pencurian-Keylogger, Phishing, Spyware 201
6,8 Payload-stealthing-Backdoor, Rootkit 202
6.9 Penanggulangan 206
6.10 Direkomendasikan Membaca dan Situs Web 215
6.11 Syarat Key, Tinjau Pertanyaan, dan Masalah 216
Bab 7 Denial-of-Service Serangan 220
7.1 Denial-of-Service Serangan 221
7.2 Banjir Serangan 228
7.3 Distributed Denial-of-Service Serangan 230
7.4 Aplikasi Berbasis Bandwidth Serangan 232
7.5 Reflector dan Amplifier Serangan 234
7.6 Pertahanan Terhadap Denial -dari-Service Serangan 239
7.7 Menanggapi Denial-of-Service Attack 243
7.8 Rekomendasi Membaca dan Web Situs 244
7,9 Syarat Key, Tinjau Pertanyaan, dan Masalah 245
Sedang diterjemahkan, harap tunggu..
 
Bahasa lainnya
Dukungan alat penerjemahan: Afrikans, Albania, Amhara, Arab, Armenia, Azerbaijan, Bahasa Indonesia, Basque, Belanda, Belarussia, Bengali, Bosnia, Bulgaria, Burma, Cebuano, Ceko, Chichewa, China, Cina Tradisional, Denmark, Deteksi bahasa, Esperanto, Estonia, Farsi, Finlandia, Frisia, Gaelig, Gaelik Skotlandia, Galisia, Georgia, Gujarati, Hausa, Hawaii, Hindi, Hmong, Ibrani, Igbo, Inggris, Islan, Italia, Jawa, Jepang, Jerman, Kannada, Katala, Kazak, Khmer, Kinyarwanda, Kirghiz, Klingon, Korea, Korsika, Kreol Haiti, Kroat, Kurdi, Laos, Latin, Latvia, Lituania, Luksemburg, Magyar, Makedonia, Malagasi, Malayalam, Malta, Maori, Marathi, Melayu, Mongol, Nepal, Norsk, Odia (Oriya), Pashto, Polandia, Portugis, Prancis, Punjabi, Rumania, Rusia, Samoa, Serb, Sesotho, Shona, Sindhi, Sinhala, Slovakia, Slovenia, Somali, Spanyol, Sunda, Swahili, Swensk, Tagalog, Tajik, Tamil, Tatar, Telugu, Thai, Turki, Turkmen, Ukraina, Urdu, Uyghur, Uzbek, Vietnam, Wales, Xhosa, Yiddi, Yoruba, Yunani, Zulu, Bahasa terjemahan.

Copyright ©2024 I Love Translation. All reserved.

E-mail: