Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 32 from your keywords: subject="investigation"
1 2 3 4 Next Last Page
cover
Digital forensic education: an experiential learning approach (studies in big…
Comment Share
Choo, Kim-Kwang RaymondZhang, Xiaolu

In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also pr…

Edition
-
ISBN/ISSN
9783030235499
Collation
xii, 307 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
363.25 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
Fundamentals of digital forensics: theory, methods, and real-life applications
Comment Share
Kävrestad, Joakim

This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis …

Edition
Second edition
ISBN/ISSN
9783030389536
Collation
xiii, 268 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
363.25 KAV f
Availability1
Add to basket
MARC DownloadCite
cover
Pembuatan cyber exercise untuk cybercrime investigation berbasis Open Source …
Comment Share
Nanang TriantoAmiruddinArizalMuhammad Rohmanur Rizqi

Politeknik Siber dan Sandi Negara (Poltek SSN) merupakan perguruan institusi pendidikan untuk memenuhi kebutuhan sumber daya manusia di Badan Siber dan Sandi Negara (BSSN). Salah satu fungsi BSSN dalam Peraturan BSSN Nomor 6 tahun 2021 Tentang Organisasi dan Tata Kerja BSSN adalah melaksanaan dukungan investigasi. Kompetensi ini menurut Peraturan BSSN Nomor 11 Tahun 2020 adalah investigasi sibe…

Edition
--
ISBN/ISSN
--
Collation
xvi, 150 hlm.
Series Title
-
Call Number
2022 MUH p
Availability2
Add to basket
MARC DownloadCite
cover
Komputer forensik: melacak kejahatan digital
Comment Share
Feri Sulianta

Daftar isi: BAB 1 Komputer forensik BAB 2 Perangkat komputer forensik BAB 3 Metode komputer forensik BAB 4 Standardisasi komputer forensik BAB 5 Skill investigasi BAB 6 Bedah komputer forensik BAB 7 Training dan departemen komputer forensik BAB 8 Perbendaharaan komputer forensik

Edition
Ed. 1
ISBN/ISSN
9789792952971
Collation
viii, 280 hal.; ilus.; 21 cm
Series Title
-
Call Number
005.8 FER k
Availability4
Add to basket
MARC DownloadCite
cover
Malware forensics field guide for Windows systems: digital forensics field gu…
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H.Rose, Curtis W.

Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…

Edition
--
ISBN/ISSN
9781597494724
Collation
xxxviii, 518 hal.; ilus.; 23cm
Series Title
--
Call Number
005.84 MAL m
Availability2
Add to basket
MARC DownloadCite
cover
Hacking exposed computer forensics: secrets & solutions
Comment Share
Philipp, AaronCowen, DavidDavis, Chris

Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…

Edition
Second edition
ISBN/ISSN
9780071626774
Collation
xxiv, 518 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PHI h
Availability1
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, Steve

TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…

Edition
First edition
ISBN/ISSN
9780470097625
Collation
xxii, 530 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m2
Availability1
Add to basket
MARC DownloadCite
cover
Windows forensic analysis DVD toolkit
Comment Share
Casey, EoghanCarvey, Harlan A.

Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget

Edition
Second edition
ISBN/ISSN
9781597494229
Collation
xxiv, 482 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
363.25 CAR w
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
cover
The computer incident response planning handbook: executable plans for protec…
Comment Share
McCarthy, N. K.

Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…

Edition
--
ISBN/ISSN
9780071790390
Collation
xxviii, 209 hal.; ilus.; 23 cm
Series Title
--
Call Number
R005.8 McC c
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?