Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 11 12 13 14 15 Next Last Page
cover
The basics of information security: understanding the fundamentals of infosec…
Comment Share
Andress, Jason

Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…

Edition
Second Edition
ISBN/ISSN
9780128007440
Collation
xxi, 217 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND b
Availability1
Add to basket
MARC DownloadCite
cover
CISSP study guide
Comment Share
Misenar, SethConrad, EricFeldman, Joshua

Contents Chapter 1 Introduction Chapter 2 Domain 1: access control Chapter 3 Domain 2: telecommunicatons and network security Chapter 4 Domain 3: information security governance and risk management Chapter 5 Domain 4: software development security Chapter 6 Domain 5: cryptography Chapter 7 Domain 6: security architecture and design Chapter 8 Domain 7: operations security Chapter 9 Do…

Edition
Second Edition
ISBN/ISSN
9781597499613
Collation
xx, 577 hal.; ilus.; 26 cm
Series Title
--
Call Number
005.8 CON c
Availability1
Add to basket
MARC DownloadCite
cover
Applied network security monitoring: collection, detection, and analysis
Comment Share
Sanders, ChrisSmith, Jason

Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …

Edition
--
ISBN/ISSN
9780124172081
Collation
xxiv, 472 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 SAN a
Availability1
Add to basket
MARC DownloadCite
cover
The practice of network security monitoring: understanding incident detection…
Comment Share
Bejtlich, Richard

Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…

Edition
--
ISBN/ISSN
9781593275099
Collation
xxx, 341 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BEJ p
Availability1
Add to basket
MARC DownloadCite
cover
CCNA data center DCICT 640-916 official cert guide
Comment Share
Shamsee, NavaidKlebanov, DavidFayed, HeshamKarakok, Ozden

Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…

Edition
--
ISBN/ISSN
9781587144226
Collation
lv, 1004 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 SHA c
Availability1
Add to basket
MARC DownloadCite
cover
CompTia network + guide to network
Comment Share
Andrews, JeanWest, JillDean, Tamara

Table of contents: 1. Introduction to Networking. 2. How Computers Find Each Other on Networks. 3. How Data Gets Transported Over Networks. 4. Structured Cabling and Network Elements. 5. Network Cabling. 6. Wireless Networking. 7. Remote Access and Cloud Computing. 8. Network Risk Management. 9. Unified Communications and Network Performance Management. 10. Network Segmentation and Vi…

Edition
Seventh Edition
ISBN/ISSN
9781305090941
Collation
xxvii, 782 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.65 WES c
Availability1
Add to basket
MARC DownloadCite
cover
Computer networking: a top-down approach
Comment Share
Kurose, James F.Ross, Keith W.

Contents: 1. Computer Networks and the Internet 2. Application Layer 3. Transport Layer 4. The Network Layer: Data Plane 5. The Network Layer: Control Plane 6. The Link Layer: Links, Access Networks, and LANs 7. Wireless and Mobile Networks 8. Security in Computer Networks 9. Multimedia Networking

Edition
Seventh Edition
ISBN/ISSN
9780133594140
Collation
iv, 823 hal.; ilus.; 24cm
Series Title
--
Call Number
004.65 KUR c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
Wireless personal area networks: performance,interconnections and security wi…
Comment Share
Misic, JelenaMisic, Vojislav B.

Table of contents: Pt. I. WPANS and 802.15.4 1. Prologue: Wireless Personal Area Networks 2. Operation of the IEEE 802.15.4 Network Pt. II. Single-Cluster Networks 3. Cluster with Uplink Traffic 4. Cluster with Uplink and Downlink Traffic 5. MAC Layer Performance Limitations 6. Activity Management through Bernoulli Scheduling 7. Admission Control Issues Pt. III. Multi-cluster Netw…

Edition
--
ISBN/ISSN
9780470518472
Collation
xxi, 312 hal.; ilus.; 25 cm
Series Title
Wiley series on wireless communications and mobile computing
Call Number
621.382
Availability1
Add to basket
MARC DownloadCite
cover
Database security
Comment Share
Basta, AlfredZgola, Melissa

Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

Edition
--
ISBN/ISSN
9781435453906
Collation
x, 299 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BAS d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?