Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 194 from your keywords: subject="Computer Network"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Belajar sendiri Cisco DSL router, ASA firewall dan VPN
Comment Share
Hendra Wijaya

Buku ini merupakan pedoman panduan yang membahas cara membuat koneksi cepat ke internet dengan Cisco DSL Router, cara melindungi LAN dengan Cisco ASA Firewall, dan cara melakukan akses aman dari jauh dengan Cisco VPN.

Edition
-
ISBN/ISSN
978602001075
Collation
xvi, 224 hlm.; 21 cm.
Series Title
-
Call Number
004.65 HEN b
Availability1
Add to basket
MARC DownloadCite
cover
Router mikroTik: implementasi wireless LAN indoor
Comment Share
Rendra TowidjojoMohammad Eno Farhan

Daftar isi: BAB 1 Introduction to wireless local area network (WLAN) BAB 2 Mikrotik wireless BAB 3 Basic service set BAB 4 Extended service set (ESS) BAB 5 Wireless distribution system (WDS) BAB 6 WDS mesh BAB 7 Controller access point system manager (CAPsMAN) BAB 8 User manager BAB 9 Best practice

Edition
--
ISBN/ISSN
9786020823058
Collation
xiv, 282 hal.; ilus.; 21 cm
Series Title
--
Call Number
004.68 REN r
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber safety: computer and mobile device safety made easy
Comment Share
Sammons, JohnCross, Michael

Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …

Edition
--
ISBN/ISSN
9780124166509
Collation
xv, 237 hal.; ilus.; 23 cm.
Series Title
--
Call Number
005.8 SAM b
Availability1
Add to basket
MARC DownloadCite
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and applied mathematics
Comment Share
Metcalf, LeighCasey, William

Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…

Edition
--
ISBN/ISSN
9780128044520
Collation
xi, 188 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.820151 MET c
Availability2
Add to basket
MARC DownloadCite
cover
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Comment Share
Sood, Aditya KEnbody, Richard J

Table of Contents A Few Words About Targeted Cyber Attacks Acknowledgments About the Authors Overview Chapter 1. Introduction References Chapter 2. Intelligence Gathering 2.1 Intelligence Gathering Process 2.2 OSINT, CYBINT, and HUMINT 2.3 OSNs: A Case Study References Chapter 3. Infecting the Target 3.1 …

Edition
1st edition
ISBN/ISSN
9780128006047
Collation
xv, 142 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 SOO t
Availability1
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
cover
Cyber warfare: techniques, tactics and tools for security practitioners
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Acknowledgments Foreword Why a Book on Cyber Warfare Is Important Why Should You Read This Book Introduction Abstract Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion Chapter 1. What is Cyber Warfare? Abstract Information in This Chapter What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Import…

Edition
Second Edition
ISBN/ISSN
9780124166721
Collation
xi, 306 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 AND c
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber warfare: understanding the fundamentals of cyber warfare …
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…

Edition
1st edition
ISBN/ISSN
9780124047372
Collation
x, 150 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 WIN b
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and IT infrastructure protection
Comment Share
Vacca, John

Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…

Edition
--
ISBN/ISSN
9780124166813
Collation
xxiv, 356 hal.;ilus.; 24 cm
Series Title
--
Call Number
005.8 VAC c
Availability2
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?