Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 53 from your keywords: subject="Computer crimes"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cyber security awareness for corporate directors and board members
Comment Share
Willson, DavidDalziel, Henry

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics field guide for Windows systems: digital forensics field gu…
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H.Rose, Curtis W.

Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…

Edition
--
ISBN/ISSN
9781597494724
Collation
xxxviii, 518 hal.; ilus.; 23cm
Series Title
--
Call Number
005.84 MAL m
Availability2
Add to basket
MARC DownloadCite
cover
The law of electronic commerce
Comment Share
Davidson, Alan

Terdapat bibliografi dan indeks. Table of contents: 1. The law of electronic commerce 2 The rule of cyberspace 3. Electronic commerce and the law of contract 4. Shrinkwrap, Clickwrap and Browsewrap contracts 5. Electronic signatures 6. Copyright issues in electronic commerce 7 Electronic commerce? trade marks, patents and circuit layouts 8. Domain names 9. Domain name disputes 10. …

Edition
First edition
ISBN/ISSN
9780521678650
Collation
xxxvii, 399 hal.; ilus.; 23 cm
Series Title
--
Call Number
343 DAV l
Availability1
Add to basket
MARC DownloadCite
cover
Hacking exposed computer forensics: secrets & solutions
Comment Share
Philipp, AaronCowen, DavidDavis, Chris

Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…

Edition
Second edition
ISBN/ISSN
9780071626774
Collation
xxiv, 518 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PHI h
Availability1
Add to basket
MARC DownloadCite
cover
Inside cyber warfare
Comment Share
Carr, Jeffrey

Terdapat indeks. Table of contents: 1. Assessing the Problem 2. The Rise of the Nonstate Hacker 3. The Legal Status of Cyber Warfare 4. Responding to International Cyber Attacks as Acts of War 5. The Intelligence Component to Cyber Warfare 6. Nonstate Hackers and the Social Web 7. Follow the Money 8. Organized Crime in Cyberspace 9. Investigating Attribution 10. Weaponizing Malware…

Edition
Second edition
ISBN/ISSN
9781449310042
Collation
xviii, 294 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 CAR i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber attacks: protecting national infrastructure
Comment Share
Amoroso, Edward G.

Table of Contents Preface Acknowledgments 1. Introduction National Cyber Threats, Vulnerabilities, and Attacks Botnet Threat National Cyber Security Methodology Components Deception Separation Diversity Consistency Depth Discretion Collection Correlation Awareness Response Implementing the Principles Nationally Protecting the Critical National Infrastructure Against Cyber …

Edition
1st edition
ISBN/ISSN
9780123849175
Collation
xi, 233 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 AMO c
Availability2
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, Steve

TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…

Edition
First edition
ISBN/ISSN
9780470097625
Collation
xxii, 530 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m2
Availability1
Add to basket
MARC DownloadCite
cover
Windows forensic analysis DVD toolkit
Comment Share
Casey, EoghanCarvey, Harlan A.

Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget

Edition
Second edition
ISBN/ISSN
9781597494229
Collation
xxiv, 482 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
363.25 CAR w
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
cover
The computer incident response planning handbook: executable plans for protec…
Comment Share
McCarthy, N. K.

Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…

Edition
--
ISBN/ISSN
9780071790390
Collation
xxviii, 209 hal.; ilus.; 23 cm
Series Title
--
Call Number
R005.8 McC c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?