Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 194 from your keywords: subject="Computer Network"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Snort IDS and IPS toolkit
Comment Share
Baker, Andrew R.Esler, Joel

Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…

Edition
--
ISBN/ISSN
9781597490993
Collation
xxxiv, 729 hal.; ilus.; 25 cm
Series Title
Jay beale's open source security series
Call Number
005.8 BAK s
Availability2
Add to basket
MARC DownloadCite
cover
Network security auditing
Comment Share
Jackson, Chris

Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…

Edition
1st edition
ISBN/ISSN
9781587053528
Collation
xxiv, 488 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 JAC n
Availability1
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
Practical packet analysis: using Wireshark to solve real-world network problems
Comment Share
Sanders, Chris

Table of Contents Chapter 1 Packet Analysis and Network Basics Packet Analysis and Packet Sniffers How Computers Communicate Traffic Classifications Final Thoughts Chapter 2 Tapping into the Wire Living Promiscuously Sniffing Around Hubs Sniffing in a Switched Environment Sniffing in a Routed Environment …

Edition
2nd Edition
ISBN/ISSN
9781593272661
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.66 SAN p
Availability1
Add to basket
MARC DownloadCite
cover
Microsoft Windows Security Essentials
Comment Share
Gibson, Darril

Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…

Edition
--
ISBN/ISSN
9781118016848
Collation
xxiv, 312 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GIB m
Availability1
Add to basket
MARC DownloadCite
cover
Packet guide to core network protocols
Comment Share
Hartpence, Bruce

Table of Contents Chapter 1 Networking Models What Is a Model? Why Use a Model? OSI Model Introducing TCP/IP Chapter 2 Ethernet Remember the Models Structure Ethernet Type II vs. 802.3 MAC Addresses—Another Look Ethernet Operation Shared Media Physical Layer Encoding Other Types of Signaling Topologies Final Th…

Edition
--
ISBN/ISSN
9781449306533
Collation
xv, 137 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.62 HAR p
Availability1
Add to basket
MARC DownloadCite
cover
Coding for penetration testers: building better tools
Comment Share
Andress, JasonLinn, Ryan

Table of Contents 1. Intro to Command Shell Scripting - Information in this Chapter - On Shell Scripting - UNIX, Linux, and OS X Shell Scripting - Bash Basics - Putting It All Together with Bash - Windows Scripting - PowerShell Basics - Putting it all together with PowerShell 2. Intro to Python - Information in this Chapter - What is Python? - W…

Edition
1st edition
ISBN/ISSN
9781597497299
Collation
xxiv, 295 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND c
Availability1
Add to basket
MARC DownloadCite
cover
Trik membuat jaringan komputer dan wi-fi: cara mudah membuat jaringan kompute…
Comment Share
Jubilee Enterprise

Daftar isi: BAB 1 Mengenal berbagai peralatan untuk membuat jaringan komputer BAB 2 Proses pembuatan jaringan komputer BAB 3 Konfigurasi jaringan komputer menggunakan MS windows BAB 4 Membuat jaringan internet BAB 5 Username dan password tiap-tiap komputer BAB 6 Membatasi penggunaan komputer BAB 7 Berbagai file (file sharing) BAB 8 Konsultasi internal antarjaringan komputer B…

Edition
Pertama
ISBN/ISSN
9786020240428
Collation
x, 206 hal.; ilus.; 21 cm
Series Title
--
Call Number
004.6 JUB t
Availability1
Add to basket
MARC DownloadCite
cover
CCNP TSHOOT 642-832 official certification guide
Comment Share
Wallace, Kevin

CONTENTS: 1. Introduction to network maintenance 2. Introduction to troubleshooting processes 3. The maintenance and troubleshooting toolbox 4. Basic cisco catalyst switch troubleshooting 5. Advanced cisco catalyst switch troubleshooting 6. Introduction to troubleshooting routing protocols 7. OSPF and route redistribution troubleshooting 8. Troubleshooting BGP and router performa…

Edition
-
ISBN/ISSN
978587058448
Collation
xvii, 508 hlm.: ilus.; 28 cm.
Series Title
-
Call Number
004.65 WAL c
Availability1
Add to basket
MARC DownloadCite
cover
Cisco router: konfigurasi voice, video, dan fax
Comment Share
Rahmat Rafiudin

Buku ini akan memberikan berbagai contoh kofigurasi sesuai kebutuhan Anda. Selain bersifat konseptual, buku ini juga bersifat praktis sehingga mudah dipahami oleh para pembacanya. Untuk itu, Anda dapat langsung mempraktikkan konfigurasi-konfigurasi yang dibahas menggunakan router. Jika router tidak dimiliki, Anda bias mempraktikkannya menggunakan router simulator yang banyak tersedia di Internet.

Edition
-
ISBN/ISSN
9797633667
Collation
xi, 218 hlm.; 23 cm.
Series Title
-
Call Number
004.65 RAH c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?