Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 28 from your keywords: subject="BERT"
First Page Previous 1 2 3 Next Last Page
cover
Cyber crime and cyber terrorism investigator's handbook
Comment Share
Akhgar, BabakStaniforth, AndrewBosco, Francesca M.

Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …

Edition
--
ISBN/ISSN
9780128007433
Collation
xxiii, 282 hal.; ilus.; 24 cm
Series Title
--
Call Number
R363.23 AKH c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cyber-warfare: a multidisciplinary approach
Comment Share
Shakarian, PauloShakarian, JanaRuef, Andrew

Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…

Edition
1st edition
ISBN/ISSN
9780124078147
Collation
xvii, 318 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 SHA i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and IT infrastructure protection
Comment Share
Vacca, John

Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…

Edition
--
ISBN/ISSN
9780124166813
Collation
xxiv, 356 hal.;ilus.; 24 cm
Series Title
--
Call Number
005.8 VAC c
Availability2
Add to basket
MARC DownloadCite
cover
Counterterrorism and cybersecurity: total information awareness
Comment Share
Lee, Newton

Contents: Part I Counterterrorism in retrospect: then and now 1 September 11 attacks 2 U.S. intelligence community Part II Counterterrorism technologies: total information awareness 3 The rise fall of total information awareness 4 The afterlife of total information awareness 5 Artificial intelligence and data mining Part III Counterterrorism technologies: social media nad cyberse…

Edition
--
ISBN/ISSN
9781489986733
Collation
xii, 234 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 LEE c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity for beginners
Comment Share
Meeuwisse, Raef

Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…

Edition
Second Edition
ISBN/ISSN
9781911452034
Collation
xviii, 206 hal.; 23 cm
Series Title
--
Call Number
005.8 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Dark territory: the secret history of cyber war
Comment Share
Kaplan, Fred

Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…

Edition
--
ISBN/ISSN
9781476763255
Collation
vii, 344 hal.; 21 cm
Series Title
--
Call Number
363.3 KAP d
Availability1
Add to basket
MARC DownloadCite
cover
Applied Oracle security: developing secure database and middleware environments
Comment Share
Knox, David (David C.)

David C. Knox ... [et al.].

Edition
-
ISBN/ISSN
9780071613705 (alk.
Collation
xxv, 610 p. : ill. ; 24 cm.
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Cyberwar: law and ethics for virtual conflicts
Comment Share
Ohlin, Jeens DavidGovern, KevinFinkelstein, Claire

Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" /​ Larry May 2.Is There Anything Morally Special about Cyberwar? /​ James L Cook 3.Cyber Causation /​ Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law /​ Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…

Edition
--
ISBN/ISSN
9780198717508
Collation
xxxii, 274 hal.; 25 cm.
Series Title
--
Call Number
341.6 OHL c
Availability1
Add to basket
MARC DownloadCite
cover
Writing Research Papers
Comment Share
Djoko AchyantoHayward, WesJames D. Lester James D Lester Jr

avoiding unintentional plagiarism, exploring ideas with others. Addressing the reader. Dst

Edition
7
ISBN/ISSN
9780321952950
Collation
xviii,398hal.;ilus.;23cm
Series Title
null
Call Number
808.02 LES w
Availability0
Add to basket
MARC DownloadCite
cover
The next war zone: confronting the global threat of of cyber terrorism
Comment Share
Dunnigan, James F.

THE NEXT WAR ZONE CONFRONTING THE GLOBAL THREAT OF CYBERTERRORISM JAMES F. DUNNIGAN CHAPTER 1: Cyberwar and You 1 Technical Terms You Might Not Recognize in This Chapter 1 Good News, Bad News 2 Bringing the War Home 5 Let’s Just Do It 6 The Bad Guys and What They Do 7 Cyberwar 10 The Major Unknown 13 The Most Likely Cyberwars 14 The Usual Suspects 15 What Can Be Done? 17 CHAPTER…

Edition
-
ISBN/ISSN
806524138
Collation
xiii, 303 hlm.; 23 cm.
Series Title
-
Call Number
363.3 DUN n
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?