Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 70 from your keywords: subject="Engineering"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Implementasi game-based learning berbasis android untuk meningkatkan security…
Comment Share
Nurul QomariasihI Komang Setia BuanaR Budiarto HadiprakosoHilya Tazkia Kamalia

Abstrak: Pengguna internet di seluruh dunia terus meningkat, termasuk di Indonesia. Namun, peningkatan ini tidak diimbangi dengan peningkatan kesadaran keamanan di kalangan masyarakat Indonesia. Hal ini menyebabkan maraknya serangan terhadap keamanan informasi, seperti social engineering. Social engineering adalah tindakan memengaruhi dan memanipulasi orang untuk membocorkan informasi sensiti…

Edition
--
ISBN/ISSN
--
Collation
xiii + 71 halaman
Series Title
--
Call Number
2023 HIL i
Availability2
Add to basket
MARC DownloadCite
cover
Social engineering: the science of human hacking
Comment Share
Hadnagy, Christopher

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool ev…

Edition
Second edition
ISBN/ISSN
9781119433385
Collation
xxii, 297 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 HAD s
Availability3
Add to basket
MARC DownloadCite
cover
Panduan menulis untuk mahasiswa & pelajar
Comment Share
Wagstaff, Samuel S.Mary LeaPhylis creme

Menulis untuk berbagai mata kuliah, teknik menulis cepat, membuat jurnal pembelajaran dan bagaimana tulisan anda dinilai.

Edition
pertama
ISBN/ISSN
9796837838
Collation
xii, 246 hlm.; ilus.; 23 cm
Series Title
null
Call Number
411 CRE p
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi teknik game-based learning berbasis Android guna meningkatkan se…
Comment Share
GirinotoNurul QomariasihRaden Budiarto HadiprakosoSalsa Alma'ariz

Rekapitulasi serangan siber yang diterbitkan oleh Pusat operasi keamanan siber nasional Badan Siber dan Sandi Negara menunjukkan serangan yang diterima pada tahun 2021 dilakukan dengan metode serangan social engineering. Dalam mencegah serangan social engineering tersebut, maka diperlukan cara untuk meningkatkan kesadaran kemanan terhadap social engineering itu sendiri salah satunya dengan Educ…

Edition
--
ISBN/ISSN
--
Collation
xiv, 35 hlm.
Series Title
-
Call Number
2022 SAL i
Availability2
Add to basket
MARC DownloadCite
cover
CMMI for acquisition: guidelines for improving the acquisition of products an…
Comment Share
Shrum, SandyGallagher, Brian P.Philips, MikeRichter, Karen J.

Terdapat indeks. Table of Contents: Part One: About CMMI for Acquisition Chapter 1: Introduction Chapter 2: Process Area Components Chapter 3: Tying It All Together Chapter 4: Relationships Among Process Areas Chapter 5: Using CMMI Models Chapter 6: Essays on CMMI-ACQ in Government and Industry Part Two: Generic Goals and Generic Practices, and the Process Areas Part Three: The …

Edition
Second edition
ISBN/ISSN
9780321711519
Collation
xxi, 603 hal.; ilus.; 24 cm
Series Title
SEI series in software engineering
Call Number
005.1 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
cover
CMMI for development: guidelines for process integration and product improvement
Comment Share
Chrissis, Mary BethKonrad, MikeShrum, Sandy

Table of Contents List of Perspectives xiii Preface xv Book Acknowledgments xxi Part One: About CMMI for Development 1 Chapter 1: Introduction 3 About Process Improvement 4 About Capability Maturity Models 9 Evolution of CMMI 10 CMMI Framework 14 CMMI for Development 18 Chapter 2: Process Area Components 19 Core Process Areas and CMMI Models 19 Required, Expected, and Info…

Edition
Third Edition
ISBN/ISSN
9780321711502
Collation
xxiv, 650 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHR c
Availability1
Add to basket
MARC DownloadCite
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
Rekayasa perangkat lunak: terstruktur dan berorientasi objek
Comment Share
M. ShalahuddinRosa A. S.

Daftar isi: 1 Pendahuluan 1.1 Perangkat Lunak 1.2 Rekayasa Perangkat Lunak 1.3 Proses Rekayasa Perangkat Lunak 1.4 Teknologi Informasi Sosial 2 Analisis dan Desain Sistem 2.1 Definisi Analisis Sistem 2.2 Teknik Pengumpulan Data 2.3 Jenis Kebutuhan 2.4 Definisi Desain Sistem 3 SDLC 3.1 Pengertian SDLC 3.2 Model SDLC 4 Basis Data 4.1 Pengerti…

Edition
Ed. I
ISBN/ISSN
9786021514054
Collation
viii, 296 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.36 ROS r
Availability18
Add to basket
MARC DownloadCite
cover
Reversing: secrets of reverse engineering
Comment Share
Eilam, Eldad

Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…

Edition
--
ISBN/ISSN
9780764574818
Collation
xxviii, 589 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 EIL r
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?