Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 46 from your keywords: subject="Hacking"
First Page Previous 1 2 3 4 5 Last Page
cover
The pentester blueprint: starting a career as an ethical hacker
Comment Share
Wylie, Phillip LCrawley, Kim

Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…

Edition
-
ISBN/ISSN
9781119684305
Collation
xx, 172 hlm; ilus.; 23 cm
Series Title
--
Call Number
005.1092 WYL t
Availability1
Add to basket
MARC DownloadCite
cover
Teknik hacking android
Comment Share
Dedik Kurniawan

Buku ini akan membimbing Anda dalam belajar cara-cara hacking Android. Anda akan ditunjukkan berbagai hal yang mungkin tidak pernah Anda bayangkan sebelumnya dan tentu materi-materi pada buku ini akan sangat bermanfaat untuk Anda yang berminat mengutak-atik ponsel Anda. Dijamin, Anda akan heran dan kagum karena ternyata hacking Android itu sangat mudah untuk dilakukan. Daftar isi: 1. Blues…

Edition
-
ISBN/ISSN
9786230000973
Collation
xii, 244 hlm.: ilus.; 21 cm
Series Title
--
Call Number
005.1092 DED t
Availability4
Add to basket
MARC DownloadCite
cover
Panduan praktis web hacking dari subkultural programmer
Comment Share
Arie PrabawatiJasman

Daftar isi: BAB 1 APA ITU HACKING - Apa itu hacking dan web-hacking? - Sekilas mengenai tujuan hacking - Mengapa belajar web-hacking itu penting? BAB 2 POINT OF HACK - variabel dari sumber eksternal - error reporting - instruction separation dan comments - logical operators BAB 3 BYPASSING WEB-FIREWALL - avoid string replace - encoding dan decoding - file append - strin…

Edition
--
ISBN/ISSN
9789792946079
Collation
vi, 226 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 JAS p
Availability2
Add to basket
MARC DownloadCite
cover
Cult of the dead cow: how the original hacking supergroup might just save the…
Comment Share
Menn, Joseph

Table of Contents Author's Note ix The Players xi Chapter 1 An Evening in San Francisco 1 Chapter 2 Texas T-Files 9 Chapter 3 The Cons 21 Chapter 4 Underground Boston 37 Chapter 5 Back Orifice 53 Chapter 6 One Million Dollars and a Monster Truck 71 Chapter 7 Oxblood 85 Chapter 8 Much @stake 107 Chapter 9 Tor and Citizen Lab 127 Chapter 10 Jake 139 Chapter 11 Mixter, Muench, and…

Edition
-
ISBN/ISSN
9781541762367
Collation
xi, 253 hlm.; ilus.; 20,5 cm
Series Title
-
Call Number
005.84 MEN c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking multifactor authentication
Comment Share
Grimes, Roger A.

TABLE OF CONTENTS Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 2 Authentication Basics 33 3 Types of Authentication 59 4 Usability vs Security 101 Part II Hacking MFA 121 5 Hacking MFA in General 123 6 Access Control Token Tricks 141 7 Endpoint …

Edition
-
ISBN/ISSN
9781119650799
Collation
xxxi, 542 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.84 GRI h
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Linn, RyanEagle, ChrisHarper, AllenRegalado, DanielSims, StephenSpasojevic, BrankoMartinez, LindaBaucom, MichaelHarris, The Late Shon

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, ov…

Edition
Fifth edition
ISBN/ISSN
9781260108415
Collation
640 hlm.; 23 cm
Series Title
-
Call Number
005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
Hackathons: from idea to successful implementation
Comment Share
Kohne, AndreasWehmeier, Volker

This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. Table of conten…

Edition
-
ISBN/ISSN
9783030588380
Collation
xi, 106 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005 KOH h
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Beginning ethical hacking with kali linux: computational techniques for resol…
Comment Share
Sinha, Sanjib

The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosyst…

Edition
-
ISBN/ISSN
9781484238905
Collation
xx, 417 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.84 SIN b
Availability1
Add to basket
MARC DownloadCite
cover
Understanding network hacks: attack and defense with Python 3
Comment Share
Ballmann, Bastian

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense meth…

Edition
2nd Edition
ISBN/ISSN
9783662621561
Collation
xv, 220 hlm.; 24 cm
Series Title
-
Call Number
005.84 BAL u
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?