Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
CEH (Certified Ethical Hacker) : 500% illegal
Comment Share
Jonny Hidayat

Daftar isi: Bagian 1 Denial of service Apa itu denial of service attack Apa itu distributed denial of service attack Teknik serangan DoS dan DDoS Botnet Tools DoS Mendeteksi serangan DoS Strategi untuk mengatasi DoS Teknik-teknik melawan botnet Langkah-langkah mencegah DoS/DDoS Proteksi DoS/DDoS di level ISP Mengaktifkan TCP intercept pada IOS cisco Perangkat keras untuk perlind…

Edition
--
ISBN/ISSN
9789791090865
Collation
viii, 252 hal.: ilus.; 21 cm
Series Title
--
Call Number
005.84 JON c
Availability2
Add to basket
MARC DownloadCite
cover
Information Technology Risk Management in enterprise Environments:a review in…
Comment Share
Jane KounsDaniel Minoli

CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…

Edition
first
ISBN/ISSN
9780471762546
Collation
xvii,421hal.;ilus.;24cm
Series Title
null
Call Number
658.4 KOU i
Availability1
Add to basket
MARC DownloadCite
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat Python: Python programming for hackers and reverse engineers
Comment Share
Seitz, Justin

The world's best hackers are using Python to do their handiwork. Shouldn't you? Author Bio Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends a great deal of time bughunting, reverse engineering, and doing Python development and malware analysis. Table of contents Introduction Chapter 1: Setting Up Your Development Environment Chapter 2: Debuggers and…

Edition
1st edition
ISBN/ISSN
9781593271923
Collation
xx, 189 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SEI g
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
cover
Snort IDS and IPS toolkit
Comment Share
Baker, Andrew R.Esler, Joel

Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…

Edition
--
ISBN/ISSN
9781597490993
Collation
xxxiv, 729 hal.; ilus.; 25 cm
Series Title
Jay beale's open source security series
Call Number
005.8 BAK s
Availability2
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
A guide to kernel exploitation : attacking the core
Comment Share
Perla, EnricoMassimiliano, Oldani

pt. I A JOURNEY TO KERNEL LAND ch. 1 From User-Land to Kernel-Land Attacks Introduction Introducing the Kernel and the World of Kernel Exploitation Why Doesn't My User-Land Exploit Work Anymore? An Exploit Writer's View of the Kernel User-Land Processes and the Scheduler Open Source versus Closed Source Operating Systems ch. 2 A Taxonomy of Kernel Vulnerabilities Uninitializ…

Edition
--
ISBN/ISSN
9781597494861
Collation
xxi, 442 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 PER g
Availability1
Add to basket
MARC DownloadCite
cover
Managing an information security and privacy awareness and training program
Comment Share
Herold, Rebecca

Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …

Edition
2nd Edition
ISBN/ISSN
9781439815458
Collation
xxx, 538 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.478 HER m
Availability1
Add to basket
MARC DownloadCite
cover
Oracle 11g Anti-hacker's Cookbook
Comment Share
Neagu, Adrian

Contents: 1. Operating system security 2. Securing the network and data in transit 3. Securing data at rest 4. Authentication and user security 5. Beyond privileges: oracle virtual privat database 6. Beyond privileges: oracle label security 7. Beyond privileges: oracle database vault 8. Tracking and analisys: database auditing and analysis: database auditing

Edition
--
ISBN/ISSN
9781849685269
Collation
282 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 NEA o
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?