Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 38 from your keywords: subject="Computer networks--Se...
First Page Previous 1 2 3 4 Next Last Page
cover
Snort IDS and IPS toolkit
Comment Share
Baker, Andrew R.Esler, Joel

Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…

Edition
--
ISBN/ISSN
9781597490993
Collation
xxxiv, 729 hal.; ilus.; 25 cm
Series Title
Jay beale's open source security series
Call Number
005.8 BAK s
Availability2
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and IT infrastructure protection
Comment Share
Vacca, John

Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…

Edition
--
ISBN/ISSN
9780124166813
Collation
xxiv, 356 hal.;ilus.; 24 cm
Series Title
--
Call Number
005.8 VAC c
Availability2
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Felici, Massimo

Contents: Cloud computing Towards trustworthiness assurance in the cloud Security and privacy in mobile cloud under a citizen’s perspective Bringing accountability to the cloud: addressing emerging threats and legal perspectives Introducing life management platforms and collaborative service fusion to contextual environments Security and privacy management Integrating…

Edition
--
ISBN/ISSN
9783642412042
Collation
xiv, 177 hal.; ilus.; 24 cm
Series Title
Communications in computing and information science
Call Number
R005.8 FEL c
Availability2
Add to basket
MARC DownloadCite
cover
Cyber security engineering: a practical approach for systems and software ass…
Comment Share
Mead, Nancy R.Woody, Carol C.

Contents: Chapter 1 Cyber security engineering: lifecycle assurance of systems and software 1.1 Intoduction 1.2 What do we mean by lifecycle assurance 1.3 Introducing principles for software assurance 1.4 Addressing lifecycle assurance 1.5 Case studies used in this book Chapter 2 Risk analysis-identifying and prioritizing needs 2.1 Risk management concepts 2.2 Mission risk 2.3 Mi…

Edition
--
ISBN/ISSN
9780134189802
Collation
xxiii, 352 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 MEA c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity for beginners
Comment Share
Meeuwisse, Raef

Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…

Edition
Second Edition
ISBN/ISSN
9781911452034
Collation
xviii, 206 hal.; 23 cm
Series Title
--
Call Number
005.8 MEE c
Availability0
Add to basket
MARC DownloadCite
cover
Principles of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Edition
Third Edition
ISBN/ISSN
9780840031167
Collation
xxvi, 589 hlm.; 23 cm.
Series Title
-
Call Number
005.8 WHI p

Edition
Third Edition
ISBN/ISSN
9780840031167
Collation
xxvi, 589 hlm.; 23 cm.
Series Title
-
Call Number
005.8 WHI p
Availability2
Add to basket
MARC DownloadCite
cover
A guide to computer network security
Comment Share
Kizza, Joseph Migga

Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…

Edition
--
ISBN/ISSN
9781848009165
Collation
xxiv, 472 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 KIZ a
Availability1
Add to basket
MARC DownloadCite
cover
Designing network security
Comment Share
Kaeo, Merike

Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …

Edition
--
ISBN/ISSN
1578700434
Collation
xv, 426 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAE d
Availability1
Add to basket
MARC DownloadCite
cover
Implementing SSL/TLS using cryptography and PKI
Comment Share
Davies, Joshua

Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…

Edition
--
ISBN/ISSN
9780470920411
Collation
xxxii, 663 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?