Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 3 from your keywords: author=Cross, Michael
cover
The basics of cyber safety: computer and mobile device safety made easy
Comment Share
Sammons, JohnCross, Michael

Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …

Edition
--
ISBN/ISSN
9780124166509
Collation
xv, 237 hal.; ilus.; 23 cm.
Series Title
--
Call Number
005.8 SAM b
Availability1
Add to basket
MARC DownloadCite
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
Web application vulnerabilities: detect, exploit, prevent
Comment Share
Cross, MichaelKapinos, StevenMeer, HaroonMuttik, IgorPalmer, Steve

Chapter 1: Introduction to web application hacking Introduction Web application architecture components Complex web application software components Putting it all together The web application hacking methodology The history of web application hacking and the evolution of tools Chapter 2: Information Gathering Techniques Introduction The principles of automating searches Ap…

Edition
1st edition
ISBN/ISSN
9781597492096
Collation
xv, 460 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.8 CRO w
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?