Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 41 from your keywords: subject="Computer networks--Se...
1 2 3 4 5 Last Page
cover
The executive guide to information security : threats, challenges, and solutions
Comment Share
Mark Egan

Edition
1
ISBN/ISSN
9780321304513
Collation
xix, 268 hal. : ilus ; 24 cm.
Series Title
-
Call Number
005.8 EGA e

Edition
1
ISBN/ISSN
9780321304513
Collation
xix, 268 hal. : ilus ; 24 cm.
Series Title
-
Call Number
005.8 EGA e
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
cover
DNS security : defending the Domain Name System
Comment Share
Liska, AllanStowe, GeoffreyGallo, Timothy

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security for cyber physical systems
Comment Share
Ali, SaqibAl Balushi, TaiseeraNadir, ZiaHussain, Omar Khadeer

Edition
-
ISBN/ISSN
9783319758794
Collation
xxi, 174 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 ALI c

Edition
-
ISBN/ISSN
9783319758794
Collation
xxi, 174 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 ALI c
Availability2
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for CEOs and management
Comment Share
Willson, DavidDalziel, Henry

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and pro…

Edition
-
ISBN/ISSN
9780128047545
Collation
xi, 42 hm.: ilus.; 23 cm
Series Title
-
Call Number
658.4 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for corporate directors and board members
Comment Share
Willson, DavidDalziel, Henry

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Hunting cyber criminals: a hacker's guide to online intelligence gathering to…
Comment Share
Troia, Vinny

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?