Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 30 from your keywords: subject="Hackers"
First Page Previous 1 2 3 Next Last Page
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's guide to OS X: exploiting OS X from the root up
Comment Share
Bathurst, RobertRogers, RussGhassemlouei, Alijohn

Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…

Edition
1st edition
ISBN/ISSN
9781597499507
Collation
x, 235 hal.; illus.; 24 cm
Series Title
--
Call Number
005.84 BAT h
Availability1
Add to basket
MARC DownloadCite
cover
Professional penetration testing: creating and operating a formal hacking lab
Comment Share
Wilhelm, Thomas

Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…

Edition
1st edition
ISBN/ISSN
9781597494250
Collation
xix, 504 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 WIL p
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Harris, ShonEagle, ChrisHarper, AllenNess, JonathanLenkey, GideonWilliams, Terron

Terdapat indeks. Table of Contents: Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Dist…

Edition
Third editon
ISBN/ISSN
9780071742559
Collation
xxiv, 693 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
The rootkit arsenal: escape and evasion in the dark corners of the system
Comment Share
Blunden, Bill

Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…

Edition
1st edition
ISBN/ISSN
9781598220612
Collation
xxvii, 908 hal.; ilus;; 23 cm
Series Title
--
Call Number
005.8 BLU r
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's handbook: the strategy behind breaking into and defending networks
Comment Share
Young, SusanAitel, Dave

Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …

Edition
--
ISBN/ISSN
0849308887
Collation
xxxiv, 860 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 YOU h
Availability1
Add to basket
MARC DownloadCite
cover
Computer forensics: investigating hard disks, file and operating systems (vol…
Comment Share
Helba, Stephen

Table of contents: 1. Understanding file systems and hard disks 2. Understanding digital media devices 3. Windows, Lunux, and Macintosh boot processes 4. Windows forensics I 5. Windows forensics II 6. Linux forensics 7. Application password crackers

Edition
--
ISBN/ISSN
9781435483507
Collation
various pagings.; ilus.; 28 cm
Series Title
--
Call Number
363.25 HEL i
Availability1
Add to basket
MARC DownloadCite
cover
CEH (Certified Ethical Hacker) : 500% illegal
Comment Share
Jonny Hidayat

Daftar isi: Bagian 1 Denial of service Apa itu denial of service attack Apa itu distributed denial of service attack Teknik serangan DoS dan DDoS Botnet Tools DoS Mendeteksi serangan DoS Strategi untuk mengatasi DoS Teknik-teknik melawan botnet Langkah-langkah mencegah DoS/DDoS Proteksi DoS/DDoS di level ISP Mengaktifkan TCP intercept pada IOS cisco Perangkat keras untuk perlind…

Edition
--
ISBN/ISSN
9789791090865
Collation
viii, 252 hal.: ilus.; 21 cm
Series Title
--
Call Number
005.84 JON c
Availability2
Add to basket
MARC DownloadCite
cover
Security jaringan komputer berbasis CEH
Comment Share
Rifkie Primartha

Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…

Edition
--
ISBN/ISSN
9786026232571
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.84 RIF s
Availability3
Add to basket
MARC DownloadCite
cover
Phishing: cara mudah menyadap password dan pencegahannya
Comment Share
Efvy Zam

DAFTAR ISI Bab 1. Pendahuluan Gambaran teknik phishing Mengapa phishing bisa terjadi? Bab 2. Web clonning Bab 3. Script penyadap password Password dalam file teks Password dikirim ke email Bab 4. Trik memilih hosting gratis Bab 5. Belajar upload file Web based upload Filezilla Bab 6. Studi kasus phishing Facebook Step 1. Web clonning Step 2. Domain manipulation Step 3…

Edition
--
ISBN/ISSN
9797944522
Collation
vii, 167 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 EFV p
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?