Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 54 from your keywords: subject="Komputer -- Pengamana...
First Page Previous 1 2 3 4 5 Next Last Page
cover
Inside network perimeter security
Comment Share
Northcutt, StephenZeltser, LennyWinters, ScottKent, KarenRitchey, Ronald W.

Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…

Edition
Second edition
ISBN/ISSN
0672327376
Collation
xxxii, 734 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR i
Availability2
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
The basics of hacking and penetration testing: ethical hacking and penetratio…
Comment Share
Engebretson, Patrick

Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test

Edition
1st edition
ISBN/ISSN
9781597496551
Collation
xvii, 159 hal.; ilus.; 24 cm
Series Title
Syngress the basics
Call Number
005.84 ENG b
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's guide to OS X: exploiting OS X from the root up
Comment Share
Bathurst, RobertRogers, RussGhassemlouei, Alijohn

Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…

Edition
1st edition
ISBN/ISSN
9781597499507
Collation
x, 235 hal.; illus.; 24 cm
Series Title
--
Call Number
005.84 BAT h
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
The basics of web hacking: tools and techniques to attack the web
Comment Share
Pauli, Joshua J.

Contents : Chapter 1: The Basics of Web Hacking Chapter 2: Web Server Hacking Chapter 3: Web Application Recon and Scanning Chapter 4: Web Application Exploitation with Injection Chapter 5: Web Application Exploitation with Broken Authentication Chapter 6: Web Using Hacking Chapter 7: Fixes Chapter 8: Nets Steps

Edition
--
ISBN/ISSN
9780124166004
Collation
xiii, 145 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PAU b
Availability1
Add to basket
MARC DownloadCite
cover
PKI security solutions for the Enterprise : solving HIPAA, E-Paper Act, and o…
Comment Share
Abu AhmadiRaina, Kapil

PART 1. TRUST BASICS: INS AND OUTS OF PKI. Chapter 1. What is Trust? Chapter 2. Complexities of PKI. Chapter 3. Best Practices of PKI. Chapter 4. Selling PKI. PART 2. SOLUTIONS FOR TRUST. Chapter 5. Healthcare Solutions. Chapter 6. Financial Solutions. Chapter 7. Government Solutions. Chapter 8. Communication Solutions. Chapter 9. Other Solutions. PART 3. TRUST …

Edition
null
ISBN/ISSN
9780471315292
Collation
xxiii, 307 hlm : ilus.; 24 cm
Series Title
--
Call Number
005.82 RAI p
Availability1
Add to basket
MARC DownloadCite
cover
Web and information security
Comment Share
Andrea HirataGalbraith, Steven D.Ferrari, ElenaThuraisingham, Bhavani

This book covers basic concepts of web and information system security and provides new insights into the semantic web field and its related security challenges TABLE OF CONTENTS Part I: Securing the Semantic Web Chapter I: Creating a Policy-Aware Web: Discretionary, Rule-based Access for the World Wide Wev Daniel J. Weitzner, MIT Computer Science and AI Laboratory, USA Jim Hendler, Univ…

Edition
null
ISBN/ISSN
1591405904
Collation
xii, 318 hlm.: ilus.; 26 cm
Series Title
--
Call Number
005.8 FER w
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?