Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Cybersecurity blue team toolkit
Comment Share
Tanner, Nadean H.

As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner’s wide array of experience from teaching at a University to w…

Edition
-
ISBN/ISSN
9781119552932
Collation
xxiii, 262 hlm.; ilus.: 24 cm
Series Title
--
Call Number
005.8 TAN c
Availability2
Add to basket
MARC DownloadCite
cover
Hardware security: a hands-on learning approach
Comment Share
Bhunia, SwarupTehranipoor, Mark

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The …

Edition
-
ISBN/ISSN
9780128124772
Collation
xxiii, 502 hlm.; ilus.; 23,5 cm
Series Title
--
Call Number
005.82 BHU h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity essentials
Comment Share
Brooks, Charles J.Grow, ChristopherCraig, PhilipShort, Donald

Table of contents PART I SECURING THE INFRASTRUCTURE Chapter 1 Infrastructure Security in the Real World Chapter 2 Understanding Access-Control and Monitoring Systems Chapter 3 Understanding Video Surveillance Systems Chapter 4 Understanding Intrusion-Detection and Reporting Systems Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises PART II SECURING LOCA…

Edition
-
ISBN/ISSN
9781119362395
Collation
xxvi, 758 hlm.; ill.: 23 cm
Series Title
--
Call Number
005.8 BRO c
Availability2
Add to basket
MARC DownloadCite
cover
Keamanan jaringan komputer
Comment Share
Didik Tristianto

Keamanan jaringan komputer adalah suatu model komputer tunggal yang melayani seluruh tugas-tugas komputasi suatu organisasi kini telah diganti degan sekumpulan computer yang terpisah-pisah akan tetapi saling berhubungan dalam melaksanakan tugasnya. Buku Keamanan Jaringan Komputer mengurai tentang networking, kemanan jaringan, konsep dasar kemanan komputer, kriptografi dan kriptanalisis. Keamana…

Edition
-
ISBN/ISSN
9786237715351
Collation
viii, 131 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 DID k
Availability1
Add to basket
MARC DownloadCite
cover
The pentester blueprint: starting a career as an ethical hacker
Comment Share
Wylie, Phillip LCrawley, Kim

Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…

Edition
-
ISBN/ISSN
9781119684305
Collation
xx, 172 hlm; ilus.; 23 cm
Series Title
--
Call Number
005.1092 WYL t
Availability1
Add to basket
MARC DownloadCite
cover
Towards a resilient regional cyber security : perspective and challenges in s…
Comment Share
FitrianiChristian PareiraNaufal Armia Arifin

"The rapid growth of internet, digital, social media and mobile users in Southeast Asia has increased the possibility of cyber misuse. The digital domain connects over half of the region population, opening economic possibilities, but also increasing their vulnerability to crimes and security breaches done via the internet. Aside from the cyber security challenges faced by individuals and busin…

Edition
-
ISBN/ISSN
9789791295307
Collation
216 hlm.; 24 cm
Series Title
--
Call Number
005.8 FIT t
Availability1
Add to basket
MARC DownloadCite
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
cover
Data security in cloud storage (wireless networks)
Comment Share
Zhang, YuanXu, ChunxiangShen, Xuemin Sherman

Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D

Edition
-
ISBN/ISSN
9789811543739
Collation
xii, 171 hlm.; ilus.; 24 cm
Series Title
-
Call Number
004.6782 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
Ghost in the wires: my adventures as the world's most wanted hacker
Comment Share
Mitnick, KevinSimon, William L.

Table of Contents Prologue xv Part 1 The Making of a Hacker 1 Rough Start 3 2 Just Visiting 7 3 Original Sin 20 4 Escape Artist 34 5 All Your Phone Lines Belong to Me 44 6 Will Hack for Love 53 7 Hitched in Haste 62 8 Lex Luthor 72 9 The Kevin Mitnick Discount Plan 94 10 Mystery Hacker 102 Part 2 Eric 11 Foul Play 111 12 You Can Never Hide 116 13 The Wiretapper 126 14 You…

Edition
-
ISBN/ISSN
9780316037723
Collation
xii, 412 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 MIT g
Availability1
Add to basket
MARC DownloadCite
cover
Encryption for organizations and individuals: basics of contemporary and quan…
Comment Share
Ciesla, Robert

Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their va…

Edition
-
ISBN/ISSN
9781484260555
Collation
xxi, 286 hlm; ilus; 23,5 cm
Series Title
-
Call Number
005.82 CIE e
Availability2
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?