Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 40 from your keywords: subject="Network Security"
1 2 3 4 Next Last Page
cover
Applied Incident Response
Comment Share
Anson, Steve

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…

Edition
-
ISBN/ISSN
9781119560289
Collation
446 hal
Series Title
-
Call Number
004.65 ANS a
Availability1
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
ISO/IEC 27002 -- Information technology -- security techniques -- code of pra…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…

Edition
Second edition
ISBN/ISSN
--
Collation
vii, 80 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
Network security dan cyber security: teori dan praktik CISCO CCNA, linux, win…
Comment Share
Iwan SofanaRifkie Primartha

Cybersecurity adalah kegiatan yang menjamin kerahasiaan, keutuhan dan ketersediaan informasi sehingga tetap aman. Keamanan siber juga merupakan upaya, aktivitas, atau tindakan multi pihak untuk melindungi akses jaringan, sistem, program, dan data dari berbagai ancaman siber atau akses ilegal Daftar Isi: BAGIAN 1 BAB 1. Pendahuluan Security BAB 2. Network Security BAB 3. Menyiapkan LAB Pr…

Edition
Cet. I
ISBN/ISSN
9786237131038
Collation
xiv, 506 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 IWA n
Availability2
Add to basket
MARC DownloadCite
cover
Wireless kung fu: networking & hacking
Comment Share
S'to

Buku ini menggabungkan bahan dari CWNA (Certified Wireless Network Administrator) yang merupakan sertifikasi internasional digabungkan dengan praktek sehari-hari agar apa yang anda pelajari bisa diimplementasikan Daftar Isi: BAB 1 Go wireless, wifi dan 802.11 BAB 2 Modus wi-fi BAB 3 Wireless modul Ad-Hoc BAB 4 Mengenal access pont (AP/WAP) BAB 5 Perhitungan kekuatan signel BAB 6…

Edition
Pertama
ISBN/ISSN
9789791090926
Collation
x, 226 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO w
Availability2
Add to basket
MARC DownloadCite
cover
Buku sakti wireless hacking: temukan dan eksploitasi kelemahan jaringan wirel…
Comment Share
Efvy Zam

Buku Sakti Wireless Hacking ini merupakan edisi revisi dari buku yang berjudul Step by Step Wireless Hacking . Pergantian judul dilakukan karena ada berbagai penambahan materi dan update lainnya. Tujuannya agar menjadi lebih fokus dan tepat sasaran dalam melakukan aksi wireless hacking. Melalui buku ini, Anda mempelajari bagaimana mencari, bahkan mengeksploitasi kelemahan yang ada pada jaringa…

Edition
Pertama
ISBN/ISSN
9786020286167
Collation
x, 235 hlm; ilus; 21 cm
Series Title
--
Call Number
004.66 EFV b
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…

Edition
-
ISBN/ISSN
9781803248745
Collation
816 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
The pentester blueprint: starting a career as an ethical hacker
Comment Share
Wylie, Phillip LCrawley, Kim

Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…

Edition
-
ISBN/ISSN
9781119684305
Collation
xx, 172 hlm; ilus.; 23 cm
Series Title
--
Call Number
005.1092 WYL t
Availability1
Add to basket
MARC DownloadCite
cover
Towards a resilient regional cyber security : perspective and challenges in s…
Comment Share
FitrianiChristian PareiraNaufal Armia Arifin

"The rapid growth of internet, digital, social media and mobile users in Southeast Asia has increased the possibility of cyber misuse. The digital domain connects over half of the region population, opening economic possibilities, but also increasing their vulnerability to crimes and security breaches done via the internet. Aside from the cyber security challenges faced by individuals and busin…

Edition
-
ISBN/ISSN
9789791295307
Collation
216 hlm.; 24 cm
Series Title
--
Call Number
005.8 FIT t
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?