Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Web application vulnerabilities: detect, exploit, prevent
Comment Share
Cross, MichaelKapinos, StevenMeer, HaroonMuttik, IgorPalmer, Steve

Chapter 1: Introduction to web application hacking Introduction Web application architecture components Complex web application software components Putting it all together The web application hacking methodology The history of web application hacking and the evolution of tools Chapter 2: Information Gathering Techniques Introduction The principles of automating searches Ap…

Edition
1st edition
ISBN/ISSN
9781597492096
Collation
xv, 460 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.8 CRO w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber reconnaissance, surveillance, and defense
Comment Share
Shimonski, Robert

Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…

Edition
1st edition
ISBN/ISSN
9780128013083
Collation
xv, 241 hal.; ilus.; 24 cm
Series Title
--
Call Number
327.12 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
OS X exploits and defense: own it... just like windows or Linux!
Comment Share
Baccas, PaulFinisterre, KevinHarley, David

Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…

Edition
1st edition
ISBN/ISSN
9781597492546
Collation
viii, 333 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAC o
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion detection
Comment Share
Northcutt, StephenNovak, Judy

Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …

Edition
Third Edition
ISBN/ISSN
0735712654
Collation
xvii, 490 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR n
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptography: protocols, algorithms, and source code in C
Comment Share
Schneier, Bruce

Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…

Edition
Second Edition
ISBN/ISSN
9780471117094
Collation
xxiii, 758 hlm.; 24 cm.
Series Title
--
Call Number
005.82 SCH a
Availability12
Add to basket
MARC DownloadCite
cover
Auditing IT infrastructures for compliance
Comment Share
Weiss, Martin M.Solomon, Michael G.

Table of Contents Chapter 1: The Need for Information Systems Security Compliance Chapter 2: Overview of U.S. Compliancy Laws Chapter 3: What Is the Scope of an IT Compliance Audit? Chapter 4: Auditing Standards and Frameworks Chapter 5: Planning an IT Infrastructure Audit for Compliance Chapter 6: Conducting an IT Infrastructure Audit for Compliance Chapter 7: Writing the …

Edition
1st edition
ISBN/ISSN
9780763791810
Collation
iii, 384 hal.; ilus.; 24 cm
Series Title
Information systems security & assurance series
Call Number
004.0681 WEI a
Availability1
Add to basket
MARC DownloadCite
cover
The Basic of hacking and penetration testing: ethical hacking and penetration…
Comment Share
Enggebretson, Patrick

Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test

Edition
Second Edition
ISBN/ISSN
9780124116443
Collation
xviii, 204 hlm: ilus.; 23 cm
Series Title
--
Call Number
005.84 ENG b
Availability2
Add to basket
MARC DownloadCite
cover
Cyber security engineering: a practical approach for systems and software ass…
Comment Share
Mead, Nancy R.Woody, Carol C.

Contents: Chapter 1 Cyber security engineering: lifecycle assurance of systems and software 1.1 Intoduction 1.2 What do we mean by lifecycle assurance 1.3 Introducing principles for software assurance 1.4 Addressing lifecycle assurance 1.5 Case studies used in this book Chapter 2 Risk analysis-identifying and prioritizing needs 2.1 Risk management concepts 2.2 Mission risk 2.3 Mi…

Edition
--
ISBN/ISSN
9780134189802
Collation
xxiii, 352 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 MEA c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity for beginners
Comment Share
Meeuwisse, Raef

Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…

Edition
Second Edition
ISBN/ISSN
9781911452034
Collation
xviii, 206 hal.; 23 cm
Series Title
--
Call Number
005.8 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security: deterrence and IT protection for critical infrastructures
Comment Share
Martellini, Maurizio

Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures

Edition
--
ISBN/ISSN
9783319022789
Collation
xiv, 72 hal.; ilus.; 24 cm.
Series Title
Springer briefs in computer science
Call Number
005.8 MAR c
Availability2
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?