Archive for the ‘Buku Komputer’ Category

Ari D. Klein, “Computer Software Engineering Research”
Nova Science Publishers | 2008 | ISBN: 1600217745 | 217 pages | PDF | 8,2 MB

Computer hardware continues to get smaller and computer software continues to get more complicated. Computer programming (often shortened to programming or coding) is the process of writing, testing, and maintaining the source code of computer programs. The source code is written in a programming language. This code may be a modification of existing source or something completely new. The process of writing source code requires expertise in many different subjects, including knowledge of the application domain and algorithms to implement the desired behaviour. Within software engineering, programming (the implementation) is regarded as one phase in a software development process. This book presents new leading-edge international research in the field.



Read Full Post »

Helen Dixon, “Excel 2007: Beyond the Manual”
Apress | 2007 | ISBN: 1590597982 | 417 pages | PDF | 10,5 MB

Many experienced users may initially find Excel 2007 rather disorientating. But Excel 2007: Beyond the Manual will introduce those who are already familiar with Excel basics to more advanced features, like consolidation, what-if analysis, PivotTables, sorting and filtering, and some commonly used functions.
You’ll learn how to maximize your efficiency at producing professional-looking spreadsheets and charts and become competent at analyzing data using a variety of tools. The book includes practical examples to illustrate advanced features. It also covers new features of Excel 2007 along with ways to access old features. You’ll even gain timesaving tips and shortcuts.

Read Full Post »

Adobe Acrobat 9 PDF Bible
Publisher: For Dummies | Date: 2008-11-17 | ISBN: 0470379197 | PDF | 33.89MB | 1332 pages

Find just what you need to incorporate PDFs in your workflows with the newest edition of this perennial top-selling reference and tutorial from Acrobat guru, Ted Padova. He packs these pages with tips guaranteed to help you get the most out of this powerful software. You’ll find techniques for creating, editing, and repurposing PDFs for everything from print to CD-ROMs, the Internet, e-book content, and more. Keep this classic within reach—you’ll turn to it again and again.


Read Full Post »

TrainSignal Cisco CCNA Security 640 553 DVD (Including Bonus DVD) [Tutorial] | 4 GB + 2,5 GB
Trainer: Chris Bryant | Run Time: 13 hours | For Windows only

In as little as 13 hours, you’ll learn how to Identify, lockdown, & secure Vulnerabilities in a small to medium enterprise branch network… and have the Knowledge necessary to pass the Cisco CCNA Security/IINS 640-553 Exam… Guaranteed!

Cisco CCNA Security Training Course FAQs

“Am I qualified to take this course?”

YES! If you are a network administrator, an aspiring network administrator, or have on-the-job security experience, this course will build a stronger foundation of advanced security concepts.

YES! If you have Cisco CCNA Certification or a basic understanding of Cisco Routers and Switches (without certification), this course is for you.

Note: The prerequisite to take the Cisco CCNA Security exam is Cisco CCNA certification.

Note: If you plan to continue on to the CCSP certification, the Cisco CCNA Security certification is the prerequisite.

“Do I need Cisco equipment to complete this training course?”

NO You do not need any Cisco equipment to watch the videos or to pass the Cisco CCNA Security/IINS 640-553 exam; however, working hands-on with Cisco equipment may enhance your training experience.
“I already have my CCNA. Do I need my Cisco CCNA Security certification?”

YES! The ability to secure a Cisco network is one of the most marketable skills for any Cisco professional and network security has never been more important.

Cisco CCNA Security Course Outline:

Video 1
Hackers – Their Motives and Methods

Learn about Hacker Roles and why they hack. Discover what your Network Security Goals should be, and how to implement Network Security Best Practices to achieve those goals to keep from suffering the consequences of ineffective network security.

* Why Do Hackers Hack?
* General Network Security Goals
* The Consequences of Ineffective Network Security
* Where Network Attacks Originate From
* Social Engineering Attacks
* Trojan Horses and Privilege Escalation Attacks
* Using Ping Sweeps and Port Scans on Your Own Network
* Best Practices

Video 2

Introduction to SDM (Security Device Manager)

Improve productivity, simplify router deployments, and troubleshoot complex connectivity issues using the Security Device Manager. Plus, launch, login, and tour SDM and discover some Real World SDM issues as you learn to manage your router away from the Command Line.

* Cisco’s Security Device Manager (SDM)
* Pre-installation Configuration
* Installing SDM
* Launching and Loading SDM
* SDM Settings – User Preferences
* SDM Configure Window
* Additional Tasks Tab
* SDM Monitor Window
* SDM in Internet Explorer Problem

Video 3
Authentication, Authorization, and Accounting (AAA)

Learn how Authentication works in AAA, what happens when you specify different devices used for Authentication, and discover commands used in Authentication, Authorization, and Accounting that will be useful in the real world and on the exam. Plus, configure TACAS+ and RADIUS security protocols.

* What is AAA?
* TACAS+ and RADIUS Configuration
* Authentication Configuration
* No Authentication Option
* Telnet Login Problem
* Real World Not About AAA Lists
* Using AAA for Privileged EXEC Mode and PPP
* Accounting
* Authorization
* Configuring AAA with SDM

Video 4
Layer 2 Security

Learn how to prevent security threats like CAM Overflow attacks by configuring and implementing Port Security, Sticky Addresses, Lightweight Extensible Authentication Protocol (LEAP), and SPAN. Plus, discover the relationship between DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard and learn to configure and operate Root Guard and BPDU Guard.

* Basic L2 Security Features
* Cisco Password Rules Review
* Preventing CAM Overflow Attacks with Port Security
* Port Security
* Configuring Port Security
* Misconfiguring Port Security
* Aging Time for Secure Addresses
* Sticky Addresses
* Configuring MAC Table Event Notification
* Dot1x Port-Based Authentication
* Cisco Lightweight Extensible Authentication Protocol (LEAP)
* Extensible Authentiaction Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
* Local SPAN Configuration
* Remote SPAN Configuration
* Filtering Intra-VLAN Traffic
* VLAN Access List (VACL)
* Private VLAN
* DHCP Snooping
* Dynamic ARP Inspection
* IP Source Guard
* MAC Address Flooding Attacks
* VLAN Hopping
* Root Guard
* BPDU Guard

Video 5
Layer 3 Security

This is one of the most important videos in the course because of the volume of detailed information that you will use on the exam and in the real world. Learn about “Salting” your MD5 to make an encrypted password even stronger and discover how Network Time Protocol (NTP) will be important in your security deployment. Plus, learn to configure and use Superviews, Autosecure, Security Audits, and One-Step Lockdown via SDM to thwart ICMP based attacks, IP Spoofing, and Recon Attacks.

* Configuring Enable Password
* Privileged Level Password vs. Privleged Level Secret
* Encrypting Passwords
* Strong Passwords vs. Weak Passwords
* Creating and Testing Minimum Length Password Policy
* ”Salting” your MD5
* Network Time Protocol (NTP)
* Configuring NTP Master Time Source
* Synchronizing System Clocks
* Configuring Peering with NTP Peers Command
* Other Clock Commands
* Telnet and SSH
* Creating Banners
* Different Types of Network Attacks
* Denial of Services (DoS) Attack and SYN Flooding Attack
* TCP Intercept Defense
* ICMP (Ping) Sweep, Port Scan and Port Sweep
* Ping of Death vs. Invite of Death and Ping Floods
* Smurf Attacks
* Availability Attacks: Don’t Forget the Physical Layer!
* IP Spoofing
* IP Source Routing
* Packet Sniffers and Queries
* Other Confidentiality Attacks
* Password Attacks
* Salami Attack
* Other Network Attacks Types – Trust Exploitation
* Superviews – Role-Based CLI Views
* AutoSecure
* One-Step Lockdown
* Security Audit
* NTP and SSH in SDM
* Differences Between SDM and AutoSecure
* Logging
* Viruses and Worms
* Cisco IOS Logging Enhancements
* Buffer Overflow
* Cisco IOS Resilient Conofiguration and Login Enhancements
* exec-timeout Command

Video 6

The Intrusion Prevention System (IPS)

Learn the differences between Intrusion Detection (IDS) and Intrusion Prevention (IPS) and how they operate. Plus, discover the different approaches to identifying malicious traffic and learn to use NIPS, HIPS and Honeypots to stop it. We’ll also configure your Intrusion Prevention System using the Security Device Manager (SDM) and we’ll use the Command Line to verify this IPS configuration.

* Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)
* Signatures and Signature Types
* Honeypots
* Configuring IPS in SDM
* Editing IPS Rules
* Editing Global Settings
* SDEE Message Logs
* Viewing Signatures
* Editing and Deleting Signatures
* Verifying Your IPS Configuration

Video 7

Learn to enable a Cisco router to act as a firewall using the Cisco IOS Firewall Set. Plus, discover concepts relatively new to Cisco like Zone-based Firewalls that are meant to phase out CBAC and the “ip inspect” command. We’ll also configure and edit a firewall using the Security Device Manager’s (SDM) Basic Firewall Wizard and we’ll draw distinctions between the Basic Firewall Wizard and SDM’s Advanced Firewall Wizard.

* Firewall Basics
* Stateless and Stateful Firewalls
* Application Layer Gateway (ALG)
* The Cisco IOS Firewall Feature Set Components
* Authentication Proxy
* Plan for Firewall Success Then Succeed!
* ACL Review
* Extended ACL Review
* Extended Access Control Lists
* Real-World ACL Success Tips
* Introduction to Turbo ACLs
* CBAC and “ip inspect” command
* Real-World Tips and Best Practices
* TCP and UDP Generic Inspection
* Deep Pocket Inspection (DPI)
* Zone-Based Firewall Configuration
* Class Maps and Policy Maps
* Basic Zone Commands
* Configuring Zone Pairs
* Configuring Firewall with SDM’s Basic Firewall Wizard
* Editing Firewall with SDM
* SDM’s Advanced Firewall Wizard
* Watch Your Directions – More Tips
* ICMP Inspection
* Final Note

Video 8
Cryptography and Virtual Private Networks (VPNs)

Learn how Asymetric and Symetric Algorithms can be used to implement Cryptography Techniques that help encrypt clear text passwords. Plus, configure your own IKE policy using the Command Line and get your hands dirty by using the Security Device Manager (SDM) to configure Site-to-Site VPN and Generic Routing Encapsulation (GRE) over IPsec.

* Cryptography Techniques
* Asymmetric and Symmetric Algorithms
* RSA Algorithm
* Diffie-Hellman (DH)
* A Word or Two About SHA
* What is VPN?
* VPN Terminology and Theory
* Introduction to PKI and the Certificate of Authority
* Public Key Cryptography Standards (PKCS)
* Internet Key Exchange (IKE)
* Steps to Configure Site-to-Site VPN
* Configuring IKE Policy Using Command Line
* Policy Match Criteria
* Crypto ACLs
* Mirror Configuration
* Creating Crypto Map
* Using SDM to Configure Site-to-Site VPN
* Generating Mirror in SDM
* Testing Our Configuration
* Verifying SDM Configuration Using Command Line
* The Return of Generic Routing Encapsulation (GRE) Over IPSec
* Using SDM to Configure GRE over IPSec

Video 9
Introduction to Voice and SAN Security

You do not need to be an expert in Voice Networking or Storage Area Networking (SAN) to learn how to keep these types of networks secure. Learn the differences between FCAP and FCPAP, discover the details of LUN and LUN Masking, and delve deeper into VoIP (Voice Over IP). Whatever your experience level may be, this detailed overview of Voice and SAN Networking will provide you the insight you need to get into one of the fastest growing areas in the IT field.

* Voice Over IP Overview
* Gateways and Gatekeepers
* VoIP Protocols
* Typical VoIP Attacks and Precautions
* Introduction to Storage Area Networking (SAN)
* SAN Transport Technologies and Protocols
* SAN Security – LUNS and LUN Masking
* SAN Zones
* Virtual SANs (VSANs)

Video 10
Introduction to Cisco Network Solutions

This video will introduce you to Cisco Network Solutions including: ASA 5500, Cisco Self-Defending Network, Cisco Security Management Suite, and Cisco Security Agent. Plus, learn about the five phases of the Cisco SDLC (System Development Life Cycle) and discover the differences between Quantitative Risk Analysis and Qualitative Risk Analysis.

* System Development Life Cycle
* Cisco SDLC Phase 1 – Initiation
* Cisco SDLC Phase 2 – Acquisition and Development
* Cisco SDLC Phase 3 – Implementation
* Cisco SDLC Phase 4 – Operation and Maintenance
* Cisco SDLC Final Phase – Disposition
* Disaster Recover – Hot, Warm and Cold Sites
* Risk Analysis – Quantitative and Qualitative
* Cisco Self-Defending Network
* Cisco Security Management Suite
* IronPort
* Cisco Security Agent
* Cisco Security Agent Interceptors
* Cisco ACS
* “in-band” and “out of band”

Download: ???

Bagi yang punya bandwith gede, Mau??..

Read Full Post »

Cisco Security Architectures
Publisher: McGraw-Hill Companies | ISBN: 0071347089 | edition 1999 | PDF | 331 pages | 1,1 mb

Gives hard-to-find answers to security queries posted to the Cisco USENET Group by thousands of users weekly. Strong focus on how to use Cisco Access lists and the Cisco PIX Firewall, two especially mystifying areas. Presents a proven troubleshooting methodology useful in every situation.

My Links




Read Full Post »

Mynul Hoda, “Cisco Network Security Troubleshooting Handbook”
Cisco Press | 2005 | ISBN: 1587051893 | 1152 pages | CHM | 11,6 MB

Identify, analyze, and resolve current and potential network security problems
Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products
Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS
Flip directly to the techniques you need by following the modular chapter organization
Isolate the components of a complex network problem in sequence
Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls
With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution.
Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer.
Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting on IDS/IPS appliances, IDSM-2 blade, and NM-CIDS blade on Cisco IOS routers are covered in
Part V. In Part VI, the author examines the troubleshooting techniques for VPN/Security Management Solution (VMS) tools used for managing products from all four security domains in greater detail: IDS/IPS, AAA, VPNs, and firewalls.
Cisco Network Security Troubleshooting Handbook prepares you to troubleshoot your network’s security devices and presents step-by-step procedures for tackling issues that arise, so that you can protect your network.
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Read Full Post »

Andrew Troelsen, “Pro VB 2008 and the .NET 3.5 Platform, Third Edition (Windows.Net)”
Apress | 2008-03-24 | ISBN: 1590598229 | 1400 pages | PDF | 18.1 MB

Whether you’re moving to .NET for the first time, or you’re already writing applications on .NET 2.0 or .NET 3.0, Pro VB 2008 and the .NET 3.5 Platform, Third Edition will provide you with a solid grounding in this new technology and serve as a comprehensive reference throughout your coding career:

* Explore five new chapters of content—including the grammar of the common intermediate language (CIL), .NET generics, and object serialization services.
* Discover all the new .NET 3.5 features—nullable types, delegate covariance, ASP.NET 2.0 master pages, the new Windows Forms “Strip” controls, and much more.
* Get a professional foothold—targeted to appeal to experienced software professionals and/or graduate students of computer science (so don’t expect three chapters on iteration or decision constructs!).
* Gain a rock–solid foundation in programming using Visual Basic.
* Get comfortable with all the core aspects of the .NET platform—including assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, and much more.

Once you’ve digested the information contained in the 25 chapters of this 1000+ page book, you’ll be ready to apply this knowledge to your specific programming assignments and well equipped to explore the .NET universe on your own.

What you’ll learn?

* Everything you need to put .NET 3.5 and Visual Basic 2008 to use in your professional workbefore anyone else!
* Insights and techniques from the author’s experience since .NET 1.0
* Complete coverage of .NET 3.5—WPF, WCF and WF

Who is this book for?

Anyone with some software development experience interested in the new .NET 3.5 Platform and the Visual Basic language. Whether you’re moving to .NET for the first time or you’re already writing applications on .NET 2.0 or .NET 3.0, this book will provide you with a solid grounding in this new technology and serve as a comprehensive reference throughout your coding career.
Download: 18.1 MB, rar’d PDF

Read Full Post »

« Newer Posts - Older Posts »