Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 159 from your keywords: subject="security measures"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Comment Share
Haataja, KeijoHypponen, KonstantinPasanen, SannaToivanen, Pekka

Table of contents: 1.Introduction 2.Overview of Bluetooth Security 3.Reasons for Bluetooth Network Vulnerabilities 3.1.Vulnerability to Eavesdropping 3.2.Weaknesses in Encryption Mechanisms 3.3.Weaknesses in PIN Code Selection 3.4.Weaknesses in Association Models of SSP 3.5.Weaknesses in Device Configuration 4.Comparative Analysis of Bluetooth Security Attacks 4.1.Disclosure Threats …

Edition
--
ISBN/ISSN
9783642406454
Collation
93 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 HAA b
Availability1
Add to basket
MARC DownloadCite
cover
Applied network security monitoring: collection, detection, and analysis
Comment Share
Sanders, ChrisSmith, Jason

Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …

Edition
--
ISBN/ISSN
9780124172081
Collation
xxiv, 472 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 SAN a
Availability1
Add to basket
MARC DownloadCite
cover
The practice of network security monitoring: understanding incident detection…
Comment Share
Bejtlich, Richard

Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…

Edition
--
ISBN/ISSN
9781593275099
Collation
xxx, 341 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BEJ p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
Database security
Comment Share
Basta, AlfredZgola, Melissa

Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

Edition
--
ISBN/ISSN
9781435453906
Collation
x, 299 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BAS d
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkMcDonald, JohnSchuh, Justin

Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459

Edition
--
ISBN/ISSN
9780321444424
Collation
xxi, 557 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOW a1
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkSchuh, JustinMcDonald, Jhon

10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

Edition
--
ISBN/ISSN
9780321444424
Collation
569 hal.; ilus.; 23cm
Series Title
--
Call Number
005.8 DOW a2
Availability1
Add to basket
MARC DownloadCite
cover
The Complete Reference Network Security
Comment Share
Keith StrassbergRoberta BraggMark Rodes Qusley

The Complete Reference Network Security Daftar Isi Part I Network Security Foundation 1. Network Security Overview 3 2. Risk Analysis and Defense Mode 31 3. Security Policy Development 47 4. Security Organization 81 Part II Access Control 5. Physical Security 117 6. Authentication and Authorization Controls 127 7. Data Security Architecture 153 8. Security Management Architecture 175…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
R 005.8 BRA c
Availability0
Add to basket
MARC DownloadCite
cover
Wireless Security : Models, Threats, and Solutions
Comment Share
Panos C. LekkasRandal K. Nichols

Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 NIC w
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security:principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780131115026
Collation
xiv, 681 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?