Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Malware analyst's cookbook and DVD: tools and techniques for fighting malicio…
Comment Share
Ligh, Michael HaleAdair, StevenHartstein, BlakeRichard, Matthew

Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…

Edition
--
ISBN/ISSN
9780470613030
Collation
xxi, 716 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
005.84 LIG m
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Harris, ShonEagle, ChrisHarper, AllenNess, JonathanLenkey, GideonWilliams, Terron

Terdapat indeks. Table of Contents: Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Dist…

Edition
Third editon
ISBN/ISSN
9780071742559
Collation
xxiv, 693 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
The CERT guide to system and network security practices
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…

Edition
--
ISBN/ISSN
020173723x
Collation
xxiv, 447 hal.; ilus; 24 cm
Series Title
SEI Series in Software Engineering
Call Number
005.8 ALL c
Availability1
Add to basket
MARC DownloadCite
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
Practical intrusion analysis: prevention and detection for the twenty-first c…
Comment Share
Trost, Ryan

Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…

Edition
--
ISBN/ISSN
9780321591807
Collation
xxiv, 455 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 TRO p
Availability2
Add to basket
MARC DownloadCite
cover
SQL injection attacks and defense
Comment Share
Stuttard, DafyddMeer, HaroonClarke, JustinAlvarez, Rodrigo MarcosHartley, DaveHemler, JosephKornbrust, AlexanderO'leary-Steele, GaryRavelli, AlbertoSlaviero, Marco

Terdapat indeks. Table of contents: Ch. 1 What is SQL Injection? Ch. 2 Testing for SQL Injection Ch. 3 Reviewing Code for SQL Injection Ch. 4 Exploiting SQL Injection Ch. 5 Blind SQL Injection Exploitation Ch. 6 Exploiting the Operating System Ch. 7 Advanced Topics Ch. 8 Code-Level Defenses Ch. 9 Platform-Level Defenses Ch. 10 References.

Edition
First edition
ISBN/ISSN
9781597494243
Collation
xix, 473 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 CLA s
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Reversing: secrets of reverse engineering
Comment Share
Eilam, Eldad

Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…

Edition
--
ISBN/ISSN
9780764574818
Collation
xxviii, 589 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 EIL r
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?