Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 16 17 Next Last Page
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkMcDonald, JohnSchuh, Justin

Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459

Edition
--
ISBN/ISSN
9780321444424
Collation
xxi, 557 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOW a1
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkSchuh, JustinMcDonald, Jhon

10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

Edition
--
ISBN/ISSN
9780321444424
Collation
569 hal.; ilus.; 23cm
Series Title
--
Call Number
005.8 DOW a2
Availability1
Add to basket
MARC DownloadCite
cover
Wireless Security : Models, Threats, and Solutions
Comment Share
Panos C. LekkasRandal K. Nichols

Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 NIC w
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security:principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780131115026
Collation
xiv, 681 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Principles of network and system administration
Comment Share
Burgess, Mark

A single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks Author approaches both network and system administration from the perspective of the principles that do not change on a day-to-day basis Shows how to discover customer needs and then use …

Edition
Second Edition
ISBN/ISSN
470868074
Collation
xii, 634 hlm.; 24 cm.
Series Title
-
Call Number
004.6 BUR p
Availability1
Add to basket
MARC DownloadCite
cover
Network analysis, architecture, and design
Comment Share
McCabe, James D.

NETWORK ANALYSIS, ARCHITECTURE, AND DESIGN SECOND EDITION JAMES D. MCCABE 1 Introduction 1.1 Objectives 1 1.2 Preparation 1 1.3 Background 2 1.4 Overview of Analysis, Architecture, and Design Processes 4 1.4.1 Hierarchy and Interconnectivity 7 1.4.2 Importance of Network Analysis 8 1.4.3 Model for Network Analysis, Architecture and Design 16 1.5 A Systems Methodology 19 1.6 System D…

Edition
Second Edition
ISBN/ISSN
1558608877
Collation
xxii, 501 hlm.; ilus.; 24 cm.
Series Title
-
Call Number
004.65 MCC n
Availability1
Add to basket
MARC DownloadCite
cover
Secrets and lies: digital security in a networked world
Comment Share
Schneier, Bruce

Table of Contents THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. …

Edition
-
ISBN/ISSN
471453803
Collation
xxiii, 414 hlm.; 24 cm.
Series Title
-
Call Number
005.8 SCH s
Availability3
Add to basket
MARC DownloadCite
cover
Cryptographic protocol: security analysis based on trusted freshness
Comment Share
Kefei, ChenLing, Dong

Contents: - Introduction of Cryptographic Protocol. - Informal Analysis. - Informal Analysis of Cryptographic Protocols. - Formal Approaches to Security Definition. - Formal Approaches to Security Establishment of Authentication Protocols. - Belief Multisets to Security Establishment of Authentication Protocols. - Automation Approaches to Security Establishment of Authentication Protoc…

Edition
-
ISBN/ISSN
9787040313314
Collation
xi, 373 hlm.; 24 cm.
Series Title
Information Security
Call Number
005.82 LIN c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Hiding in plain sight: steganography and the art of covert communication
Comment Share
Cole, Eric

Contents: Introduction. Part One: Exploring the World of Covert Communication. Chapter 1: Covert Communication: It’s All Around You. Chapter 2:” Cryptography Explained. Chapter 3 :Hiding the Goods with Steganography. Chapter 4: Digital Watermarking. Part Two: The Hidden Realm of Steganography. Chapter 5: Steganography at Large. Chapter 6: Nuts and Bolts of…

Edition
-
ISBN/ISSN
471444499
Collation
xviii, 335 hlm.; 24 cm.
Series Title
-
Call Number
005.8 COL h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?