Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1157 from your keywords: callnumber=3
First Page Previous 16 17 18 19 20 Next Last Page
cover
The basics of cyber warfare: understanding the fundamentals of cyber warfare …
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…

Edition
1st edition
ISBN/ISSN
9780124047372
Collation
x, 150 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 WIN b
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cyber-warfare: a multidisciplinary approach
Comment Share
Shakarian, PauloShakarian, JanaRuef, Andrew

Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…

Edition
1st edition
ISBN/ISSN
9780124078147
Collation
xvii, 318 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 SHA i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber reconnaissance, surveillance, and defense
Comment Share
Shimonski, Robert

Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…

Edition
1st edition
ISBN/ISSN
9780128013083
Collation
xv, 241 hal.; ilus.; 24 cm
Series Title
--
Call Number
327.12 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber guerilla
Comment Share
Van Haaster, JelleGevers, RickeySprengers, Martijn

Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…

Edition
1st edition
ISBN/ISSN
9780128051979
Collation
xiv, 128 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 HAA c
Availability1
Add to basket
MARC DownloadCite
cover
Pengantar Ilmu Hukum Tata Negara
Comment Share
Jimly Asshiddiqie

Edition
1
ISBN/ISSN
9799797692100
Collation
viii, 464 hlm., ilus., 23 cm
Series Title
-
Call Number
340 JIM p

Edition
1
ISBN/ISSN
9799797692100
Collation
viii, 464 hlm., ilus., 23 cm
Series Title
-
Call Number
340 JIM p
Availability1
Add to basket
MARC DownloadCite
cover
Hukum tata negara Indonesia
Comment Share
Ni'matul Huda

DAFTAR ISI 1. Pendahuluan - Lingkp kajian HTN - Pengertian HTN dan hubungannya dengan HAN - Hubungan HTN dengan ilmu negara dan ilmu politik 2. Sumber-sumber hukum tata negara - Pengertian sumber hukum - Macam-macam sumber hukum - Sumber hukum tata negara - Hierarki Peraturan Peundang-undangan RI - Hierarki menurut UU No.10 Tahun 2004 - Hierarki menurut UU No.12 Tahun 2…

Edition
Edisi revisi
ISBN/ISSN
9789797690121
Collation
xiii, 387 hal.; 21 cm.
Series Title
--
Call Number
342.598 NI' h
Availability1
Add to basket
MARC DownloadCite
cover
Counterterrorism and cybersecurity: total information awareness
Comment Share
Lee, Newton

Contents: Part I Counterterrorism in retrospect: then and now 1 September 11 attacks 2 U.S. intelligence community Part II Counterterrorism technologies: total information awareness 3 The rise fall of total information awareness 4 The afterlife of total information awareness 5 Artificial intelligence and data mining Part III Counterterrorism technologies: social media nad cyberse…

Edition
--
ISBN/ISSN
9781489986733
Collation
xii, 234 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 LEE c
Availability1
Add to basket
MARC DownloadCite
cover
Dark territory: the secret history of cyber war
Comment Share
Kaplan, Fred

Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…

Edition
--
ISBN/ISSN
9781476763255
Collation
vii, 344 hal.; 21 cm
Series Title
--
Call Number
363.3 KAP d
Availability1
Add to basket
MARC DownloadCite
cover
Mobile broadband communications for public safety
Comment Share
Ferrus, RamonSallent, Oriol

Contents: 1 Public protection and disaster relief communications 1.1 Background and terminology 1.2 PPDR function and organizations 1.3 Operational framework and communications needs for PPDR 1.4 Communications systems for PPDR 1.5 Regulatory and standardization framework 2 Mobile broadband data applications and capacity needs 2.1 Introduction 2.2 Data-centric, multimedia applicati…

Edition
--
ISBN/ISSN
9781118831250
Collation
xxii, 334 hal.; ilus.; 25 cm
Series Title
--
Call Number
363.10028 FER m
Availability1
Add to basket
MARC DownloadCite
cover
Research design: qualitative, quantitative & mixed methods approaches
Comment Share
Creswell, John W.Creswell, J. David

Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…

Edition
5th Edition
ISBN/ISSN
9781506386768
Collation
xxv, 275 hal.; ilus.; 25 cm
Series Title
--
Call Number
300.72 CRE r2
Availability5
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?