Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 25 from your keywords: subject="Computer Software"
First Page Previous 1 2 3 Next Last Page
cover
Malware, rootkits & botnets: a beginner's guide
Comment Share
Elisan, Christopher C.

Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …

Edition
--
ISBN/ISSN
9780071792066
Collation
xxvi, 353 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 ELI m
Availability1
Add to basket
MARC DownloadCite
cover
Konsep & penerapan Microsoft TCP/IP
Comment Share
Heywood, DrewDaniel. M.W.

Judul Asli: Networking with microsoft TCP/IP Daftar isi: Bagian I: Konsep-konsep TCP/IP Bab 1 Pendahuluan Bab 2 Arsitektur TCP/IP Bab 3 Lapisan network access Bab 4 Lapisan internet Bab 5 Lapisan host-ke-host Bab 6 Lapisan aplikasi/proses Bagian II Implementasi Microsoft TCP/IP Bab 7 Pengenalan Microsoft TCP/IP Bab 8 Memasang TCP/IP pada computer windows NT Bab 9 Membangun jar…

Edition
Ed. I
ISBN/ISSN
9795336126
Collation
xiii, 490 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.7 HEY k
Availability2
Add to basket
MARC DownloadCite
cover
Exploiting software: how to break code
Comment Share
Hoglund, GregMcGraw, Gary

Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits

Edition
--
ISBN/ISSN
9780201786958
Collation
xxii, 471 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 HOG e
Availability2
Add to basket
MARC DownloadCite
cover
Software quality: a framework for success in software develpment and support …
Comment Share
Curran, EugeneSanders, Joc

Contents PART 1 Manager’s Guide to Implementing a Quality System 1 Defining Software Quality 1.1 Why bother with Quality? 1.2 Quality – What is it? 2 Managing a Quality Company 2.1 Dedication to Customer Satisfaction 2.2 Emphasis on Continuous Improvement 2.3 Treating Suppliers as Business Partners 2.4 Communication and Teamwork 2.5 Empowering Employees 2.6 Commitment by T…

Edition
--
ISBN/ISSN
0201631989
Collation
xiii, 179 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.1 SAN s
Availability1
Add to basket
MARC DownloadCite
cover
Advanced malware analysis
Comment Share
Elisan, Christopher C.

Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …

Edition
--
ISBN/ISSN
9780071819749
Collation
xxii, 522 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 ELI a
Availability1
Add to basket
MARC DownloadCite
cover
TCP/IP sockets in C: practical guide for programmers
Comment Share
Donahoo, Michael J.Calvert, Kenneth L.

Table of contents: 1.Introduction 2.Basic TCP Sockets 3.Of Names and Address Families 4.Using UDP Sockets 5.Sending and Receiving Data 6.Beyond Basic Socket Programming 7.Under the Hood 8.Socket Programming in C++

Edition
Second Edition
ISBN/ISSN
9780123745408
Collation
xiii, 196 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.7 DON t
Availability1
Add to basket
MARC DownloadCite
cover
Testing code security
Comment Share
Van der Linden, Maura A.

Contents: 1. Introduction 2. Security vocabulary 3. Software testing and changes in the security landscape 4. All trust is misplaced 5. Security testing considerations 6. Threat modeling and risk assessment processes 7. Personas and testing 8. Security test planning 9. Sample security considerations 10. Vulnerability case study : brute force browsing 11. Vulnerability case study : bu…

Edition
--
ISBN/ISSN
0849392519
Collation
xx, 303 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 VAN t
Availability1
Add to basket
MARC DownloadCite
cover
E-learning uncovered: Articulate Studio '13
Comment Share
Elkins, DianePinder, DesireeSlade, Tim

Termasuk bibliografi dan indeks. CONTENS:
1. Getting to know storyline 2
2. Creating new projects
3. Scenes and slides
4. Scenes and slides
5. Working with text
6. Adding graphics
7. Object properties
8. Arranging objects
9. Working with media
10. States & layers
11. Triggers
12. Advanced triggers & variables
13. Q…

Edition
null
ISBN/ISSN
9781502799401
Collation
xii, 274 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.5 SLA e
Availability1
Add to basket
MARC DownloadCite
cover
E-learning uncovered: Articulate Studio '13
Comment Share
Elkins, DianePinder, Desiree

Termasuk bibliografi dan indeks. CONTENS:
1. Getting to know articulate studio

Edition
null
ISBN/ISSN
9781495926969
Collation
xii, 258 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.5 ELK e
Availability1
Add to basket
MARC DownloadCite
cover
E-learning uncovered: Adobe Capativate 8
Comment Share
Elkins, DianePinder, DesireeSlade, Tim

Termasuk bibliografi dan indeks. CONTENS:
1. Getting to know captivate
2. Creating new projects
3. Adding and managing slides
4. Adding content objects
5. Audio and video
6. Managing objects
7. Actions & interactions
8. Editing software simulations
9. Variables & advanced actions
10. Questions & quizzes
11. Special tools & wiz…

Edition
null
ISBN/ISSN
9781499692495
Collation
xiv, 306 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.5 ELK e
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?