Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B No Judul 1 Advanced Statistical Steganalysis

Penulis Bhme , R.

Area riset/ penelitian

Metodologi Penerbit

Tahun

Texts and Steganalysi Springer-Verlag 2010 Monograph s Berlin s Heidelberg International Association for Cryptology Research 2007

Advances in Cryptology Kurosawa, Cryptology RSA K. (Ed.) modulus ASIACRYPT 2007 A Practical Guide to Managing Information Security

Purser , S. managing risk ARTECH information manageme HOUSE, INC. security nt and manageme nt tools in general as the primary means of controlling IT VLADIMI ROV , A & GAVRILE NKO , K & MICHAJL OWSKI , A. information security assessment s. the IT Governance philosophy, Publishing strategy and tactics of soliciting, managing and conducting information security audits of all flavours.

2004

Assessing Information Security Strategies, tactics, logic and framework

2010

CyberForensics Understanding Information Security Investigations

Bayuk , J. CyberFore technology Humana Press nsics investigatio ns based on specimens identified in the wild, Carvalho , F.D. & Silva , E.M. Security in the Informatio n Age Around the IOS Press. World in 80 Millisecon ds , Operational Security of

2010

Cyberwar-Netwar Security in the Information Age

2006

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B Ubiquitous Informatio n , How Intelligence and Security Tools Can Help 7 Advances in Sensing with Security Applications Byrnes , J. Sensing & Security Ostheimer Aplications , G. Bistatic and Springer multistatic radar sensors for homeland security , The Terrorist Threat and Its Implication s for Sensor Technologi es 2006

Digital Signatures

Katz , J.

Cryptograp Digital Springer 2010 hy Signature Science+Busines Schemes s Media, LLC without and within Random Oracles The theory of cryptograp hy, and secure multiparty computatio n in particular The security of healthcare information secure Springer-Verlag 2010 protocols Berlin for Heidelberg general secure computatio n and specific problems of interest the Springer 2010 challenges Science+Busines of s Media, LLC Electronic Healthcare

Efficient Secure TwoParty Protocols Techniques and Constructions

Hazay, C. & Lindell , Y.

10 Electronic Healthcare Information Security

Shoniregu n , C.A & Dube , K. & Mtenzi , F.

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B Informatio n Security, Policies and Legislation 11 FUTURE NATO SECURITY Edmonds , M. & Cerny , O. Addressing the Challenges of Evolving Security and Informatio n Sharing Systems and Architectur es Command, IOS Press Control, Communic ations, Computers and Intelligence 2004

12 THE AUSTIN PROTOCOL COMPILER

McGuire, T.M & Gouda, M.G.

Monograph Timed Abstract Protocol (or TAP, for short) notation

Springer Science 2005 + Business Media, Inc

13 Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

An Intellectual intellectual Elsevier Inc. informatio property property n security from an reader industrial perspective , focusing on the legal steps and preventativ e security measures that a business can take to protect itself from theft of trade secrets and other information assets

2008

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B 14 The Role of Bastille Linux in Information Security 15 Privacy-Respecting Intrusion Detection

Grimaila, M.R.

Security Bastille SANS Institute 2002 Alghorithm Configurati InfoSec Reading on Room

Flegel, U. personal develop Springer 2007 privacy and intrusion Science+Busines security detection s Media, LLC. techniques and systems to discover and react to computer attacks Foresti, S. Data protecting Springer 2011 Outsourcin sensitive Science+Busines g ins Media, LLC formation when it is stored on systems that are not under the data owners control. Lacey, D. The role and importance of people in information security theory and A John Wiley practice and Sons, Ltd., developed Publication across many different fields and industries 2009

16 Preserving Privacy in Data Outsourcing

17 Managing the Human Factor in Information Security

18 Information Security and Cryptology

Bao, F. & Cryptograp White-Box Springer-Verlag 2010 Yung, M. hy Cryptograp Berlin & Lin, D. hy and Heidelberg & Jing, J. Software Protection, and one on PostQuantum Cryptograp hy Takanen fuzz testing Operating ARTECH 2008

19 Fuzzing for Software

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B Security Testing and Quality Assurance , A. & DeMott , J. & Miller , C. project System HOUSE, INC. Utility Program Reliability The Fuzz Generator digital ARTECH identity HOUSE manageme nt technology is fundamental in customizin g and enhancing the user experience, protecting privacy, underpinni ng accountabil ity in transaction s and interactions , and complying with regulatory controls. 21 Information Security and Privacy Pieprzyk , J. & Ghodosi , H. & Dawson, E. Advanced Computing, Algorithm and Cryptograp hy Second Springer-Verlag 2007 Preimages Berlin for Iterated Heidelberg Hash Functions and Their Implication s 2011

20 Identity Management

Bertino, E. Digital & identity Concepts, Technologies, Takahashi, and Systems K.

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B on MACs. 22 Information Security Applications Chung , K. & Sohn , k. & Yung , M. Application Security and Trust Manageme nt Public Key Springer-Verlag 2009 Crypto Berlin Application Heidelberg s , Privacy and Anonymity , N/W Security and Intrusion Detection Crypto IOS Press, Inc. Application s of Combinato rial Group Theory 2011

23 Information Security, Coding Theory and Related Combinatorics Information Coding and Combinatorics 24 INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY

Crnkovi , D. & Tonchev , V.

Informatio n Security and Related Combinato rics

Deswarte , Y. & Cuppens , F. & Jajodia , S. & Wang , L.

three issues of the World Conference on Informatio n Security Education

increase personal awareness and education in security, analyze and manage risks, identify security policies, evaluate and certify products, processes and systems.

Springer Science 2004 + Business Media, Inc.

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B 25 Insider Attack and Cyber Security Beyond the Hacker

Salvatore J. Stolfo

the ultimate Insider Springer 2008 security Science+Busines problem threats, s Media, LLC. Steven M. awareness Bellovin and dealing with Shlomo nefarious Hershkop human activities in Angelos a manner D. Keromytis that respects individual liberties, and privacy policies of organizatio ns Christodor Malicious escu, M. programs & Jha, S. & Maughan, D. & Song, D. & Wang, C. recent Springer 2007 advances in Science+Busines the defense s Media, LLC. against all types of threats, and the chapters reflect a diversity of defensive techniques spywarerelated legal aspects, The laws regarding spyware are still in flux currently, and Springer 2011 Science+Busines s Media, LLC

26 Malware Detection

27 Spyware and Adware

Aycock , J.

Spyware

Nama : Nur Ihsan Nim : 108093000102 Kelas : SIK 7 B in any case are jurisdiction -specific 28 THE INFORMATION SYSTEMS SECURITY OFFICERS GUIDE Kovacich , G.L. ISSO The Butterworth Working Heinemann Environme nt, The Duties and Responsibil ities , and The Global, Professiona l, and Personal Challenges of an ISSO introduces lattices, and surveys the main provable algorithms for finding the shortest vector in a lattice, either exactly or approximat ely 30 Introduction to Cryptography Principles and Applications Delfs , H. & Knebl , H. Advanced introductio Springer-Verlag 2007 Encryption n into Berlin Standard classical Heidelberg symmetric encryption 2003

29 The LLL Algorithm

Nguyen , P.Q. & Survey and Applications Valle , B.

LLL Algorithm

Springer-Verlag 2010 Berlin Heidelberg

You might also like