Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Cyber security: deterrence and IT protection for critical infrastructures
Comment Share
Martellini, Maurizio

Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures

Edition
--
ISBN/ISSN
9783319022789
Collation
xiv, 72 hal.; ilus.; 24 cm.
Series Title
Springer briefs in computer science
Call Number
005.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
Principles of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Edition
Third Edition
ISBN/ISSN
9780840031167
Collation
xxvi, 589 hlm.; 23 cm.
Series Title
-
Call Number
005.8 WHI p

Edition
Third Edition
ISBN/ISSN
9780840031167
Collation
xxvi, 589 hlm.; 23 cm.
Series Title
-
Call Number
005.8 WHI p
Availability2
Add to basket
MARC DownloadCite
cover
From CIA to APT: an introduction to cyber security
Comment Share
Amoroso, Edward G.

--

Edition
--
ISBN/ISSN
9781522074946
Collation
112 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 AMO f
Availability1
Add to basket
MARC DownloadCite
cover
Cyberspace safety and security: 5th International Symposium, CSS 2013, Zhangj…
Comment Share
Wang, GuojunRay, IndrakshiFeng, DengguoRajarajan, Muttukrishnan

Table of contents 1. A Crawler Guard for Quickly Blocking Unauthorized Web Robot 2. Privacy Preserving for Location-Based Services Using Location Transformation 3. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux 4. Multiple-Bank E-Cash without Random Oracles 5. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy 6. Preserving User Priv…

Edition
--
ISBN/ISSN
9783319035833
Collation
xxvi, 480 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.8 WAN c
Availability0
Add to basket
MARC DownloadCite
cover
Software networks: virtualization, SDN, 5G and security Volume 1
Comment Share
Pujolle, Guy

Contents Chapter 1. Virtualization Chapter 2. SDN (software-defined networking) Chapter 3. Smart edges Chapter 4. New-generation protocols Chapter 5. Mobile cloud networking and mobility control Chapter 6. Wi-fi and 5G Chapter 7. Security Chapter 8. Concrezation and morphware

Edition
--
ISBN/ISSN
9781848216945
Collation
viii, 238 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 PUJ s
Availability2
Add to basket
MARC DownloadCite
cover
CompTIA linux+/LPIC-1 certification all-in-on exam guide
Comment Share
Tracy, Robb H.

Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …

Edition
Second edition
ISBN/ISSN
9781259863691
Collation
liii, 810 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.446 TRA c
Availability1
Add to basket
MARC DownloadCite
cover
SSFIPS securing cisco networks with sourcefire intrusion prevention system st…
Comment Share
Lammle, ToddGay, JohnTatistcheff, Alex

Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…

Edition
--
ISBN/ISSN
9781119155034
Collation
xxix, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LAM s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security basics: protect your organization by applying the fundamentals
Comment Share
Franke, Don

Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …

Edition
--
ISBN/ISSN
9781522952190
Collation
98 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FRA c
Availability1
Add to basket
MARC DownloadCite
cover
Membangun jaringan komputer: mudah membuat jaringan komputer (wire & wireless…
Comment Share
Iwan Sofana

Daftar isi: Bab 1. Pendahuluan 1.1 Pengertian Jaringan Komputer 1.2 Topologi Jaringan Komputer 1.3 Topologi Logika 1.4 Peralatan Network Bab 2. Model OSI dan Protocol TCP/IP 2.1 Apakah model OSI itu? 2.2 Model DARPA dan TCP/IP 2.3 ARP dan IP 2.4 Ipv4 Address 2.5 Ipv6 Address 2.6 Routing 2.7 Domain Name Systems (DNS) 2.8 Firewall dan Pendahuluan Security Bab 3. Membangun Ja…

Edition
Cetakan pertama
ISBN/ISSN
9786028758956
Collation
xii, 554 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.6 IWA m
Availability3
Add to basket
MARC DownloadCite
cover
Switch & multilayer switch Cisco: implementasi jaringan akses
Comment Share
Kukuh Nugroho

Daftar isi 1. Switch Cisco 1.1 Cara kerja perangkat switch 2. VLAN (Virtual LAN) 2.1 Apa itu VLAN 2.2 Konsep VLAN 2.3 Mode port switch 2.4 Menyisipkan informasi VLAN ID (VID) 2.5 Tipe VLAN 3. VTP (Virtual Trunking Protokol) 3.1 Apa itu VTP 3.2 Kenapa perlu menggunakan VTP 4. Inter-VLAN routing 4.1 Inter-VLAN routing 4.2 Inter-VLAN routing menggunakan switch layer 3 4.3 Pros…

Edition
--
ISBN/ISSN
9786026232311
Collation
vi, 274 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.65 KUK s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?