Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Implementasi DevSecOps untuk auto deploy pada sistem informasi Korpstar
Comment Share
Herman KabettaJeckson SidabutarArizalAgung Maulana Putra

Masalah pada tahap build, test dan deploy sering terjadi pada siklus hidup pengembangan sistem dengan Agile, dimana memakan banyak waktu dan menyebabkan rilis tidak sesuai jadwal. DevSecOps diharapkan dapat memberikan solusi pada masalah tersebut. Penelitian ini memberikan solusi otomatisasi build, test dan deploy di lingkungan SDLC Agile. Penelitian ini merupakan praktik penerapan DevSecOps pa…

Edition
--
ISBN/ISSN
--
Collation
xiv, 95 hlm.
Series Title
-
Call Number
2022 AGU i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi sistem multi Intrusion Detection System (IDS) dan algoritma Supp…
Comment Share
AmiruddinRaden Budiarto HadiprakosoDimas Febriyan PriambodoAchmad Husein Noor Faizi

Meningkatnya kejahatan dan serangan siber menjadikan keamanan jaringan sebagai prasyarat dasar bagi organisasi, tetapi organisasi tidak bisa menjamin hal tersebut karena penggunaan Intrusion Detection System (IDS) pada suatu organisasi masih menggunakan IDS bersensor tunggal, baik hanya berupa Host-Based IDS (HIDS) maupun hanya berupa Network-Based IDS (NIDS). Batasan ruang lingkup deteksi kedu…

Edition
--
ISBN/ISSN
--
Collation
xiv, 59 hlm.
Series Title
-
Call Number
2022 ACH i
Availability2
Add to basket
MARC DownloadCite
cover
The art of invisibility: the world's most famous hacker teaches you how to be…
Comment Share
Mitnick, KevinVamosi, Robert

Like it or not, your every move is being watched and analyzed. Consumer’s identities are being stolen, and a person’s every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge–an…

Edition
-
ISBN/ISSN
9780316380508
Collation
x, 320 hlm; 24 cm
Series Title
-
Call Number
005.1092 MIT t
Availability1
Add to basket
MARC DownloadCite
cover
IPv6 security
Comment Share
Hogg, ScottVyncke, Eric

Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…

Edition
--
ISBN/ISSN
9781587055942
Collation
xxi, 540 hal.; ilus.; 23 cm
Series Title
Cisco Press networking technology series
Call Number
005.8 HOG i
Availability1
Add to basket
MARC DownloadCite
cover
We have root: even more advice from schneier on security
Comment Share
Schneier, Bruce

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to…

Edition
-
ISBN/ISSN
9781119643012
Collation
xiii, 304 hlm; 23 cm
Series Title
-
Call Number
005.8 SCH w
Availability1
Add to basket
MARC DownloadCite
cover
Security, privacy and user interaction
Comment Share
Jakobsson, Markus

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how …

Edition
-
ISBN/ISSN
9783030437534
Collation
xv, 153 hlm.; 23 cm
Series Title
-
Call Number
005.8 JAK s
Availability1
Add to basket
MARC DownloadCite
cover
CyRM℠: mastering the management of cybersecurity (internal audit and IT audit)
Comment Share
Martin, David X

Table of Contents Introduction. Chapter 1. The Current Landscape. Prong 1: CyRM℠: Cyber Risk Management. Chapter 2. Gather Intelligence, Anticipate Risk. Chapter 3. Building a More Effective Cybersecurity Defense. Chapter 4. Align Critical Decision-Making for IT vs. Business. Chapter 5. Cybersecurity for Senior Executives and Board Members. Prong 2: CyberWellness℠. Chapter 6.…

Edition
-
ISBN/ISSN
9780367565312
Collation
viii, 138 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 MAR c
Availability1
Add to basket
MARC DownloadCite
cover
Cyberjutsu: cybersecurity for the modern ninja
Comment Share
McCarty, Ben

Table of Contents Chapter 1: Mapping Networks Chapter 2: Guarding with Special Care Chapter 3: Xenophobic Security Chapter 4: Identification Challenges Chapter 5: Double-Sealed Password Chapter 6: Hours of Infiltration Chapter 7: Access to Time Chapter 8: Tools Chapter 9: S

Edition
-
ISBN/ISSN
9781718500549
Collation
xxvii, 231 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 MCC c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber defence in the age of AI, smart societies and augmented humanity (Adva…
Comment Share
Jahankhani, HamidKendzierskyj, StefanChelvachandran, NishanIbarra, Jaime

This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies.…

Edition
-
ISBN/ISSN
9783030357450
Collation
viii, 450 hlm.; ilus.; 24 cm
Series Title
Advanced Sciences and Technologies for Security Applications
Call Number
005.8 JAH c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity the essential body of knowledge
Comment Share
Conklin, Wm. ArthurShoemaker, Dan

1. Information Security is Important. 2. A Global Road Map for Security 3. Adapting Best Practice: Tailoring a Solution that Fits 4. Defining the Company's Executive Roles 5. Defining the Company's Functional Security Roles 6. Defining the Corollary Roles for Security 7. The Data Security Competency 8. The Digital Forensics Competency 9. The Enterprise Continuity Competency 10. The Inc…

Edition
--
ISBN/ISSN
9781435481695
Collation
xviv, 499 hal.; ilus.; 24cm.
Series Title
--
Call Number
005.8 SHO c
Availability3
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?