Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Security, privacy and user interaction
Comment Share
Jakobsson, Markus

Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…

Edition
-
ISBN/ISSN
9783030437534
Collation
xv, 153 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 JAK s
Availability1
Add to basket
MARC DownloadCite
cover
Manipulated: inside the cyberwar to hijack elections and distort the truth
Comment Share
Payton, Theresa

Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…

Edition
-
ISBN/ISSN
9781538133507
Collation
xi, 193 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 PAY m
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity in humanities and social sciences: a research methods approach
Comment Share
Loiseau, HugoVentre, DanielAden, Hartmut

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…

Edition
-
ISBN/ISSN
9781786305398
Collation
xiv, 209 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8072 LOI c
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers security leaders
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…

Edition
-
ISBN/ISSN
9781119643777
Collation
x, 300 hlm; 22 cm
Series Title
-
Call Number
005.1092 CAR t
Availability2
Add to basket
MARC DownloadCite
cover
Resilience of cyber-physical systems: from risk modelling to threat counterac…
Comment Share
Flammini, Francesco

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs' exposu…

Edition
-
ISBN/ISSN
9783319955964
Collation
xvi, 229 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 FLA r
Availability1
Add to basket
MARC DownloadCite
cover
Handbook of big data privacy
Comment Share
Dehghantanha, AliChoo, Kim-Kwang Raymond

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to o…

Edition
-
ISBN/ISSN
9783030385569
Collation
ix, 397 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.74 CHO h
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity manager's guide: the art of building your security program
Comment Share
Barnum, Todd

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building an…

Edition
-
ISBN/ISSN
9781492076216
Collation
vii, 167 hlm; 22,5 cm
Series Title
-
Call Number
005.8 BAR c
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
cover
Konsep dan strategi keamanan informasi di dunia cyber
Comment Share
Richardus Eko Indrajit

Daftar isi: BAB I Cyber 6: fenomena keamanan informasi dalam dunia cyber BAB II CSIRT/CERT: tim pengawas keamanan internet BAB III Permasalahan mendasar keamanan internet BAB IV Relasi antara dunia nyata dengan dunia cyber dalam hal keamanan BAB V Strategi dan cara hacker dalam menyerang keamanan internet BAB VI Sepuluh aspek keamanan dalam standar internasional BAB VII F…

Edition
--
ISBN/ISSN
9786022622345
Collation
xiv, 259 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 RIC k
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?