Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
The network security test lab: a step-by-step guide
Comment Share
Gregg, Michael

CONTENTS: 1. Building a Hardware and Software Test Platform 2. Passive Information Gathering 3. Analyzing Network Traffic 4. Detecting Live Systems and Analyzing Results 5. Enumerating Systems 6. Automating Encryption and Tunneling Techniques 7. Automated Attack and Penetration Tools 8. Securing Wireless Systems 9. An Introduction to Malware 10. Detecting Intrusions and Analyzing Malw…

Edition
--
ISBN/ISSN
9781118987056
Collation
xxiv, 454 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 GRE n
Availability3
Add to basket
MARC DownloadCite
cover
Cyber security basics: protect your organization by applying the fundamentals
Comment Share
Franke, Don

Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …

Edition
--
ISBN/ISSN
9781522952190
Collation
98 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FRA c
Availability1
Add to basket
MARC DownloadCite
cover
Digital signatures
Comment Share
Katz, Jonathan

Contents: Part I Setting the stage 1 Digital signatures: beckground and definitions 2 Cryprographic harness assumptions Part II Digital signature schemes without random oracles 3 Constructions based on general assumptions 4 Signature schemes based on the (strong) RSA assumption 5 Constructions based on bilinear maps Part III Digital signature shemes in the random oracle model 6 T…

Edition
--
ISBN/ISSN
9780387277110
Collation
xiii, 192 hal.; 24 cm
Series Title
--
Call Number
005.8 KAT d
Availability2
Add to basket
MARC DownloadCite
cover
Operating system security
Comment Share
Jaeger, TrentSandhu, Ravi

Table of Contents: 1. Introduction 2. Access Control Fundamentals 3. Multics 4. Security in Ordinary Operating Systems 5. Verifiable Security Goals 6. Security Kernels 7. Securing Commercial Operating Systems 8. Case Study: Solaris Trusted Extensions 9. Case Study: Building a Secure Operating System for Linux 10. Secure Capability Systems 11. Secure Virtual Machine Systems …

Edition
--
ISBN/ISSN
9781598292121
Collation
xvii, 218 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 JAE o
Availability2
Add to basket
MARC DownloadCite
cover
Security jaringan komputer berbasis CEH
Comment Share
Rifkie Primartha

Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…

Edition
--
ISBN/ISSN
9786026232571
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.84 RIF s
Availability4
Add to basket
MARC DownloadCite
cover
Anti privacy: melacak, membajak, & memobol data rahasia
Comment Share
Efvy ZamSudarma S

Daftar isi Bab 1 Melacak file tersembunyi File hidden Memeriksa file tersembunyi File super hidden Memburu file tersembunyi Bab 2 Mengatasi folder yang terkunci Membuka folder terlarang Membuka folder yang diproteksi aplikasi Bab 3 Mengendus CACLS & data streams Mengatasi CACLS Mendeteksi data streams Bab 4 Ngepet file Menyedot sisi flashdisk Membajak data CD-ROM …

Edition
--
ISBN/ISSN
9797944239
Collation
viii, 192 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 EFV a
Availability1
Add to basket
MARC DownloadCite
cover
CEH certified ethical hacker all-in-one exam guide
Comment Share
Walker, Matt

CONTENTS: Chapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Hacking Through the Network: Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Low Tech: Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applica…

Edition
--
ISBN/ISSN
9780071772297
Collation
xxii, 391 hlm.: ilus.; 24 cm.
Series Title
--
Call Number
005.84 WAL c
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 100 % illegal
Comment Share
S'to

Daftar isi: Module 1. Pemahaman dasar ethical hacker Kenapa keamanan computer menjadi penting Terminologi-terminologi dasar Element-element keamanan Tahapan aktifitas hacking Pengelompokan jenis serangan Hacktivistm Ethical hacking atau hacking beretika Vulnerability research dan tools Bagaimana ethical hacker bekerja Jenis testing Metodologi testing Module 2. Footprinting Men…

Edition
Cetakan kedua
ISBN/ISSN
9789791090216
Collation
viii, 200 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c
Availability0
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 200 % illegal
Comment Share
S'to

Daftar isi: MODULE 6: ENUMERATION BAB 1 Enumeration Enumeration Null sessions Enumerasi active directory MODULE 7: SYSTEM HACKING BAB 2 Password cracking Active online attacks Passive online attacks Offline attacks Non electronic attacks BAB 3 Escalating privileges BAB 4 Executing application, keylogger & spyware Executing appli…

Edition
Cetakan kedua
ISBN/ISSN
9789791090278
Collation
vi, 202 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c2
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 400% illegal
Comment Share
S'to

Daftar isi: Module 10. Sniffer BAB 1. Sniffer, si tukang intip Ethernet dan topologi jaringan CSMA/CD Hub Switch Brosur switch Enkapsulasi dan dekapsulasi Type sniffing Protokol yang bermasalah Network viever tools Passive sniffing Active sniffing BAB 2. DNS poisoning techniques Intranet DNS spoofing Internet DNS spoofing Proxy server DNS poisoning DNS cache Poisoning B…

Edition
Cetakan pertama
ISBN/ISSN
9789791090452
Collation
viii, 188 hlm.; ILUS.; 21 cm
Series Title
--
Call Number
005.84 STO c4
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?