Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Tribe of hackers blue team
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing cos…

Edition
-
ISBN/ISSN
9781119643418
Collation
xvi, 346 hlm; 22,5 cm
Series Title
-
Call Number
005.1092 CAR t
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Beginning ethical hacking with kali linux: computational techniques for resol…
Comment Share
Sinha, Sanjib

The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosyst…

Edition
-
ISBN/ISSN
9781484238905
Collation
xx, 417 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.84 SIN b
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security practitioner's guide
Comment Share
Jahankhani, Hamid

In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the m…

Edition
-
ISBN/ISSN
9789811204456
Collation
xxxiv, 562 hlm; 23 cm
Series Title
-
Call Number
005.8 JAH c
Availability1
Add to basket
MARC DownloadCite
cover
How to measure anything in cybersecurity risk
Comment Share
Hubbard, Douglas WSeiersen, Richard

How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his best-selling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise…

Edition
-
ISBN/ISSN
9781119085294
Collation
xv, 280 hlm; 23 cm
Series Title
-
Call Number
005.8 HUB h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and decision makers: data security and digital trust
Comment Share
Fréminville, Marie De

Contents 1. An Increasingly Vulnerable World 1.1. The context 1.1.1. Technological disruptions and globalization 1.1.2. Data at the heart of industrial productivity 1.1.3. Cyberspace, an area without boundaries 1.1.4. IT resources 1.2. Cybercrime 1.2.1. The concept of cybercrime 1.2.2. Five types of threats 1.2.3. Five types of attackers 1.3. The cybersecurity market 1.3.1. The si…

Edition
-
ISBN/ISSN
9781786305190
Collation
xxi, 186 hlm.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
005.8 FRE c
Availability1
Add to basket
MARC DownloadCite
cover
Comptia security + guide to network security fundamentals (MindTap Course List)
Comment Share
Ciampa, Mark

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…

Edition
7th ed
ISBN/ISSN
9780357424377
Collation
xviii, 558 hlm.; ilus.; 27,5 cm
Series Title
-
Call Number
005.8 CIA c
Availability1
Add to basket
MARC DownloadCite
cover
Risk analysis and the security survey
Comment Share
Broder, James F.Dwi Prabantini

Termasuk bibliografi dan indeks. CONTENTS:
1. Risk
2. Vulnerability and Threat Identification
3. Risk Measurement
4. Quantifying and Prioritizing Loss Potential
5. Cost/Benefit Analysis
6. Other Risk Analysis Methodologies
7. The Security Survey
8. Management Audit Techniques and the Preliminary Survey
9. The Survey Report
10. Crime…

Edition
Third Edition
ISBN/ISSN
9780750679220
Collation
xviii, 371 hlm.; ilus.; 26 cm.
Series Title
null
Call Number
658.401 BRO r
Availability3
Add to basket
MARC DownloadCite
cover
Applied cyber security and the smart grid: implementing security controls int…
Comment Share
Knapp, Eric DSamani, RajLangill, Joel

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …

Edition
--
ISBN/ISSN
9781597499989
Collation
xxii, 202 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.310285 KNA a
Availability1
Add to basket
MARC DownloadCite
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?