Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 194 from your keywords: subject="Computer Network"
First Page Previous 16 17 18 19 20 Last Page
cover
TCP/IP sockets in C: practical guide for programmers
Comment Share
Donahoo, Michael J.Calvert, Kenneth L.

Table of contents: 1.Introduction 2.Basic TCP Sockets 3.Of Names and Address Families 4.Using UDP Sockets 5.Sending and Receiving Data 6.Beyond Basic Socket Programming 7.Under the Hood 8.Socket Programming in C++

Edition
Second Edition
ISBN/ISSN
9780123745408
Collation
xiii, 196 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.7 DON t
Availability1
Add to basket
MARC DownloadCite
cover
TCP/IP illustrated: the protocols Volume 1
Comment Share
Fall, Kevin R.Stevens, W. Richard

Contents Preface Chapter 1. Introduction Chapter 2. Link Layer Chapter 3. IP: Internet Protocol Chapter 4. ARP: Address Resolution Protocol Chapter 5. RARP: Reverse Address Resolution Protocol Chapter 6. ICMP: Internet Control Message Protocol Chapter 7. Ping Program Chapter 8. Traceroute Program Chapter 9. IP Routing Chapter 10. Dynamic Routing Protocols Chapter 11. UDP: User Datag…

Edition
Second Edition
ISBN/ISSN
9780321336316
Collation
xxxv, 1016 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.7 FAL t
Availability1
Add to basket
MARC DownloadCite
cover
Applied network security monitoring: collection, detection, and analysis
Comment Share
Sanders, ChrisSmith, Jason

Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …

Edition
--
ISBN/ISSN
9780124172081
Collation
xxiv, 472 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 SAN a
Availability1
Add to basket
MARC DownloadCite
cover
The practice of network security monitoring: understanding incident detection…
Comment Share
Bejtlich, Richard

Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…

Edition
--
ISBN/ISSN
9781593275099
Collation
xxx, 341 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BEJ p
Availability1
Add to basket
MARC DownloadCite
cover
CCNA data center DCICT 640-916 official cert guide
Comment Share
Shamsee, NavaidKlebanov, DavidFayed, HeshamKarakok, Ozden

Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…

Edition
--
ISBN/ISSN
9781587144226
Collation
lv, 1004 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 SHA c
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
CompTia network + guide to network
Comment Share
Andrews, JeanWest, JillDean, Tamara

Table of contents: 1. Introduction to Networking. 2. How Computers Find Each Other on Networks. 3. How Data Gets Transported Over Networks. 4. Structured Cabling and Network Elements. 5. Network Cabling. 6. Wireless Networking. 7. Remote Access and Cloud Computing. 8. Network Risk Management. 9. Unified Communications and Network Performance Management. 10. Network Segmentation and Vi…

Edition
Seventh Edition
ISBN/ISSN
9781305090941
Collation
xxvii, 782 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.65 WES c
Availability1
Add to basket
MARC DownloadCite
cover
Computer networking: a top-down approach
Comment Share
Kurose, James F.Ross, Keith W.

Contents: 1. Computer Networks and the Internet 2. Application Layer 3. Transport Layer 4. The Network Layer: Data Plane 5. The Network Layer: Control Plane 6. The Link Layer: Links, Access Networks, and LANs 7. Wireless and Mobile Networks 8. Security in Computer Networks 9. Multimedia Networking

Edition
Seventh Edition
ISBN/ISSN
9780133594140
Collation
iv, 823 hal.; ilus.; 24cm
Series Title
--
Call Number
004.65 KUR c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
Wireless personal area networks: performance,interconnections and security wi…
Comment Share
Misic, JelenaMisic, Vojislav B.

Table of contents: Pt. I. WPANS and 802.15.4 1. Prologue: Wireless Personal Area Networks 2. Operation of the IEEE 802.15.4 Network Pt. II. Single-Cluster Networks 3. Cluster with Uplink Traffic 4. Cluster with Uplink and Downlink Traffic 5. MAC Layer Performance Limitations 6. Activity Management through Bernoulli Scheduling 7. Admission Control Issues Pt. III. Multi-cluster Netw…

Edition
--
ISBN/ISSN
9780470518472
Collation
xxi, 312 hal.; ilus.; 25 cm
Series Title
Wiley series on wireless communications and mobile computing
Call Number
621.382
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?