Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1156 from your keywords: callnumber=3
First Page Previous 11 12 13 14 15 Next Last Page
cover
Inside cyber warfare
Comment Share
Carr, Jeffrey

Terdapat indeks. Table of contents: 1. Assessing the Problem 2. The Rise of the Nonstate Hacker 3. The Legal Status of Cyber Warfare 4. Responding to International Cyber Attacks as Acts of War 5. The Intelligence Component to Cyber Warfare 6. Nonstate Hackers and the Social Web 7. Follow the Money 8. Organized Crime in Cyberspace 9. Investigating Attribution 10. Weaponizing Malware…

Edition
Second edition
ISBN/ISSN
9781449310042
Collation
xviii, 294 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 CAR i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber attacks: protecting national infrastructure
Comment Share
Amoroso, Edward G.

Table of Contents Preface Acknowledgments 1. Introduction National Cyber Threats, Vulnerabilities, and Attacks Botnet Threat National Cyber Security Methodology Components Deception Separation Diversity Consistency Depth Discretion Collection Correlation Awareness Response Implementing the Principles Nationally Protecting the Critical National Infrastructure Against Cyber …

Edition
1st edition
ISBN/ISSN
9780123849175
Collation
xi, 233 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 AMO c
Availability2
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, Steve

TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…

Edition
First edition
ISBN/ISSN
9780470097625
Collation
xxii, 530 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m2
Availability1
Add to basket
MARC DownloadCite
cover
Windows forensic analysis DVD toolkit
Comment Share
Casey, EoghanCarvey, Harlan A.

Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget

Edition
Second edition
ISBN/ISSN
9781597494229
Collation
xxiv, 482 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
363.25 CAR w
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics processing and procedures: meeting the requirements of ISO …
Comment Share
Watson, DavidJones, Andrew

Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…

Edition
--
ISBN/ISSN
9781597497428
Collation
xxi, 857 hal.; ilus.; 28 cm
Series Title
--
Call Number
363.25 WAT d
Availability1
Add to basket
MARC DownloadCite
cover
Computer evidence: collection and preservation
Comment Share
Brown, Christopher L. T.

Terdapat indeks. Table of Contents: Part I Computer Forensics and Evidence Dynamics 1. Computer Forensics Essentials 2. Rules of Evidence, Case Law, and Regulation 3. Evidence Dynamics Part II Information Systems 4. Interview, Policy, and Audit 5. Network Topology and Architecture 6. Volatile Data Part III Data Storage Systems and Media 7. Physical Disk Technologies 8. SAN, …

Edition
Second Edition
ISBN/ISSN
9781584506997
Collation
xxvii, 518 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
363.25 BRO c
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics: investigating and analyzing malicious code
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H

Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…

Edition
--
ISBN/ISSN
9781597492683
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 AQU j
Availability1
Add to basket
MARC DownloadCite
cover
Placing the suspect behind the keyboard: using digital forensics and investig…
Comment Share
Carvey, HarlanShavers, Brett

Table of Contents Chapter 1. Introduction Digital Evidence Collection Simple File Copying “Dead Box” Approaches “Live Box” Approaches Decision-Making FlowChart Preview/Triage SmartPhones and Cellular Devices Chapter 2. High Tech Interview Introduction The Main Goal of Questioning a Suspect The Line of Questions for Suspects Questions for Victims Questions for Network Adm…

Edition
--
ISBN/ISSN
9781597499859
Collation
xxii, 267 hal.; ilus.; 25 cm
Series Title
--
Call Number
363.25 SHA p
Availability1
Add to basket
MARC DownloadCite
cover
Internet law: text and materials
Comment Share
Reed, Chris

Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…

Edition
Second Edition
ISBN/ISSN
9780521605229
Collation
xliv, 328hal.; ilus.; 23 cm
Series Title
Law in context
Call Number
343.41 REE i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?