Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 5097 dokumen yang sesuai dengan query
cover
"Hacking and penetration testing with low power devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more.
Hacking and penetration testing with low power devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer.
While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. "
Waltham, MA: Syngress, 2015
e20427047
eBooks  Universitas Indonesia Library
cover
Engebretson, Pat
Amsterdam : Elsevier, 2013
005.8 ENG b
Buku Teks  Universitas Indonesia Library
cover
"Professional penetration testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios."
Waltham, MA: Syngress, 2013
e20427657
eBooks  Universitas Indonesia Library
cover
Habte, Temesghen Tekeste
"​This book describes an ECG processing architecture that guides biomedical SoC developers, from theory to implementation and testing. The authors provide complete coverage of the digital circuit implementation of an ultra-low power biomedical SoC, comprised of a detailed description of an ECG processor implemented and fabricated on chip. Coverage also includes the challenges and tradeoffs of designing ECG processors.
- Describes digital circuit architecture for implementing ECG processing algorithms on chip;
- Includes coverage of signal processing techniques for ECG processing;
- Features ultra-low power circuit design techniques;
- Enables design of ECG processing architectures and their respective on-chip implementation."
Switzerland: Springer Cham, 2019
e20502587
eBooks  Universitas Indonesia Library
cover
Kiameh, Philip
New York: McGraw-Hill, 2012
333. 793 2 KIA p
Buku Teks  Universitas Indonesia Library
cover
Amsterdam: Elsevier, 2012
005.8 LOW
Buku Teks  Universitas Indonesia Library
cover
"This book is based on the 18 invited tutorials presented during the 27th workshop on Advances in Analog Circuit Design. Expert designers from both industry and academia present readers with information about a variety of topics at the frontiers of analog circuit design, including the design of analog circuits in power-constrained applications, CMOS-compatible sensors for mobile devices and energy-efficient amplifiers and drivers. For anyone involved in the design of analog circuits, this book will serve as a valuable guide to the current state-of-the-art.
Provides a state-of-the-art reference in analog circuit design, written by experts from industry and academia;
Presents material in a tutorial-based format;
Covers the design of analog circuits in power-constrained applications, CMOS-compatible sensors for mobile devices and energy-efficient amplifiers and drivers."
Switzerland: Springer Nature, 2019
e20509186
eBooks  Universitas Indonesia Library
cover
Putri Aditya Pratama
"Dengan adanya perkembangan teknologi saat ini, banyak pihak memberikan layanan yang dapat dimanfaatkan untuk dapat mempermudah semua kegiatan. Salah satu media yang digunakan untuk berbagai tujuan yaitu website. Salah satu jenis website yaitu website e-learning. Website e learning akan akan menyimpan informasi sensitif seperti data penggunanya untuk dapat memberikan hak akses fasilitas terhadap website tersebut. Informasi sensitif inilah yang perlu diperhatikan dalam pengembangan suatu website agar terhindar dari serangan cyber. Salah satu serangan yang sering terjadi pada website yaitu sql injection, dimana serangan ini terjadi dalam bentuk pencurian atau bahkan memodifikasi informasi pribadi oleh pihak yang tidak berhubungan. Untuk mencegah terjadi serangan pada website maka perlu dilakukannya penetration testing. Penetration testing bertujuan untuk mencari kerentanan yang ada pada website agar dapat segera ditangani sebelum dimanfaatkan oleh pihak yang tidak bertanggung jawab. Terdapat beberapa tahapan yang dilakukan untuk mengidentifikasi kerentanan website yaitu reconnaissance, scanning, exploitation dan report. Pengujian dilakukan dengan menganalisis hasil yang didapatkan dari setiap tahapan penetration testing sehingga dapat diketahui kerentanan yang ada pada website. Dari kerentanan yang terdetaksi maka akan diketahui beberapa rekomendasi solusi untuk mengatasinya. Setiap tahapan penetration testing akan menggunakan beberapa tools pendukung. Selain itu juga dilakukan pengujian keamanan website dengan melakukan serangan sql injection dan xss attack.

With the current technological developments, many parties provide services that can be used to facilitate all activities. One of the media used for various purposes is the website. One type of website is an e-learning website. An e-learning website will store sensitive information such as user data to be able to grant facility access rights to the website. This sensitive information needs to be considered in developing a website to avoid cyber attacks. One of the attacks that often occurs on websites is sql injection, where this attack occurs in the form of stealing or even modifying personal information by unrelated parties. To prevent attacks on the website, it is necessary to do penetration testing. Penetration testing aims to find vulnerabilities on the website so that they can be addressed immediately before being exploited by irresponsible parties. There are several steps taken to identify website vulnerabilities, namely reconnaissance, scanning, exploitation and reports. Testing is carried out by analyzing the results obtained from each stage of penetration testing so that the vulnerabilities that exist on the website can be identified. From the detected vulnerabilities, several recommendations for solutions to overcome them will be identified. Each stage of penetration testing will use several supporting tools. Besides that, website security testing is also carried out by carrying out sql injection attacks and xss attacks."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Baliga, B. Jayant
Boston: PWS, 1995
621.317 BAL p
Buku Teks  Universitas Indonesia Library
cover
Baliga, B. Jayant
New York: John Wiley & Sons, 1987
621.38 BAL m
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>