Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 609 from your keywords: subject="Komputer"
First Page Previous 16 17 18 19 20 Next Last Page
cover
100 kasus pemrograman visual C#
Comment Share
Sianipar, R.H.

Daftar isi: BAB 1 Pengenalan ide visual C# BAB 2 Keputusan BAB 3 Repetisi BAB 4 Metode dan array BAB 5 File dan struktur BAB 6 Struktur data Daftar pustaka

Edition
Ed. I
ISBN/ISSN
9789792953961
Collation
viii, 222 hal.; ilus.; 23 cm + 1 CD
Series Title
--
Call Number
005.262 SIA s
Availability1
Add to basket
MARC DownloadCite
cover
Mahir mengolah data penelitian dengan SPSS 25
Comment Share
Getut Pramesti

Daftar isi: Bab 1. Memulai SPSS 1.1 Memulai SPSS untuk windows 1.2 Data view 1.3 Variabel view 1.4 Menyimpan input data 1.5 Menyimpan output data Bab 2. Deskriptif Data 2.1 Statistika deskriptif 2.2 Statistika inferensial 2.3 Deskripsi data kuantitatif 2.4 Descriptive statistics-frequencies 2.5 Descriptive statistics-descriptives 2.6 Descriptive statistics-explore 2.7 Deskrip…

Edition
Pertama
ISBN/ISSN
9786020480299
Collation
viii, 196 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.5 GET m
Availability2
Add to basket
MARC DownloadCite
cover
Algoritma dan pemrograman dalam bahasa Pascal, C, dan C++
Comment Share
Rinaldi MunirLeony Lidya

Daftar isi: 1. Apakah algoritma dan pemrograman itu? 2. Konstruksi dasar algoritma 3. Nama, tipe, ekspresi, dan nilai 4. Program input/output 5. Pemrograman dengan Pascal, C, dan C++ 6. Lebih jauh dengan runtunan 7. Pemlihan 8. Pengulangan 9. Pengantar pemrograman modular 10. Prosedur 11. Fungsi 12. Larik 13. Contoh-contoh soal dan penyelesaian (1) 14. Matriks 15. Algo…

Edition
Edisi keenam
ISBN/ISSN
9786021514917
Collation
xiv, 682 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.262 RIN a2
Availability5
Add to basket
MARC DownloadCite
cover
Inside network perimeter security
Comment Share
Northcutt, StephenZeltser, LennyWinters, ScottKent, KarenRitchey, Ronald W.

Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…

Edition
Second edition
ISBN/ISSN
0672327376
Collation
xxxii, 734 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR i
Availability2
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
The basics of hacking and penetration testing: ethical hacking and penetratio…
Comment Share
Engebretson, Patrick

Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test

Edition
1st edition
ISBN/ISSN
9781597496551
Collation
xvii, 159 hal.; ilus.; 24 cm
Series Title
Syngress the basics
Call Number
005.84 ENG b
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's guide to OS X: exploiting OS X from the root up
Comment Share
Bathurst, RobertRogers, RussGhassemlouei, Alijohn

Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…

Edition
1st edition
ISBN/ISSN
9781597499507
Collation
x, 235 hal.; illus.; 24 cm
Series Title
--
Call Number
005.84 BAT h
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Data and computer communications
Comment Share
Stallings, William

Part One: Overview Ch 1. Data communication, data networks and the internet Ch 2. Protocol architecture, TCP/​IP, and internet-vbased applications Part Two: Data communications Ch 3. Data transmission Ch 4. Transmission media Ch 5. Signal encoding techniques Ch 6. Digital data communication techniques Ch 7. Dtat link control protocoils Ch 8. Multiplexing Ch 9. Spread spectrum Part …

Edition
Ninth Edition
ISBN/ISSN
9780131392052
Collation
xxv, 851 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 STA d
Availability1
Add to basket
MARC DownloadCite
cover
Data and computer communications
Comment Share
Stallings, William

Terdapat bibliografi dan indeks. Table of Contents Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERV…

Edition
Tenth Edition
ISBN/ISSN
9780133506488
Collation
xxiii, 888 hal.; ilus.; 24cm
Series Title
--
Call Number
004.6 STA d2
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?