Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 308 from your keywords: subject="Log"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Agar siapa saja mau melakukan apa saja untuk anda: kumpulan taktik psikologis…
Comment Share
Lieberman, David J.Abu Ahmadi

null

Edition
null
ISBN/ISSN
9791600325
Collation
307 hlm; ilus; 21 cm
Series Title
Get Anyone to Do Anything: Never Feel Powerless
Call Number
158.2 LIE a
Availability0
Add to basket
MARC DownloadCite
cover
Logging and log management: the authoritative guide to understanding the conc…
Comment Share
Phillips, ChristopherChuvakin, AntonSchmidt, Kevin J.Moulder, Patricia

Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…

Edition
--
ISBN/ISSN
9781597496353
Collation
xxx, 431 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHU l
Availability2
Add to basket
MARC DownloadCite
cover
The power of owncloud: membangun dan mengelola sendiri teknologi cloud di lin…
Comment Share
Dedy Setyo Afrianto

Cloud sendiri merupakan metafora dari internet/jaringan bahwa setiap[ penggunaan dapat menggunakan fasilitas di insfrastruktur ini dimana saja dan kapan saja seperti awan yang setiap saat ada di atas. Salah satu varian teknologi cloud ini adalah sloud storage yang akan dibahas dalam buku ini. Dengan ownCloud ini anda akan membuat pusat integrasi file dan data setiap pengguna dengan otentifikasi…

Edition
Ed.I
ISBN/ISSN
9789792958522
Collation
xiv, 146 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.6782 DED t
Availability2
Add to basket
MARC DownloadCite
cover
Advances and Applications in Computer Science, Electronics, and Industrial En…
Comment Share
Garcia, Marcelo V.Gordón-Gallegos, CarlosFernández-Peña, Félix

This book presents the proceedings of the 3rd Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2021), held in Ambato in October 2021, with participants from 10 countries and guest speakers from Chile, Colombia, Brasil, Spain, Portugal, and United States. Featuring 20 peer-reviewed papers, it discusses topics such as the use of metaheuristics for non-deterministic pr…

Edition
-
ISBN/ISSN
9783030977191
Collation
xii, 351 hal : 23cm
Series Title
-
Call Number
005,02 GAR a
Availability1
Add to basket
MARC DownloadCite
cover
Security Incidents and Response Against Cyber Attacks
Comment Share
Bhardwaj, AkashdeepSapra, Varun

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…

Edition
-
ISBN/ISSN
9783030691745
Collation
xiv, 246 hal : 23cm
Series Title
-
Call Number
005.8 BHA s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security: Issues and Current Trends
Comment Share
Dutta, NitulSudeep;Sarma,Hiren Kumar Deva;Pricop,Emil

This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introdu…

Edition
-
ISBN/ISSN
9789811665974
Collation
xii, 174 hal : 23 cm
Series Title
-
Call Number
005.82 DUT c
Availability1
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Spaticrypt: Platform Edukasi Kriptografi Berbasis Web dengan Konsep Gamifikas…
Comment Share
Hermawan SetiawanGirinotoRay Novita YasaMuhammad Faturrohman Sugiyarto

Kriptografi merupakan bentuk implementasi ilmu komputer dan matematika yang sangat penting dalam menjamin keamanan dan privasi data. Sebagai optimalisasi proses pembelajaran kriptografi, diperlukan media pembelajaran yang efektif dan relevan. Aplikasi berbasis web menawarkan kemudahan akses dan penggunaan, serta dapat memberikan gambaran autentik dari kasus nyata. Penelitian ini mengusulkan pla…

Edition
-
ISBN/ISSN
--
Collation
xvii, 137 hal
Series Title
-
Call Number
2024 MUH s
Availability2
Add to basket
MARC DownloadCite
cover
Analisis Komparatif Wireless Intrusion Detection System (WIDS) terhadap Seran…
Comment Share
Nanang TriantoSetiyo CahyonoIra Rosianal HikmahDavid Relikson

Penelitian ini melakukan evaluasi efektivitas Wireless Intrusion Detection System (WIDS) open-source dalam mendeteksi serangan pada jaringan Wi-Fi WPA3 dengan fokus pada tiga jenis serangan, yaitu Clogging Attack, Timing-Side Channel Attack, dan Unsupported Group Downgrade Attack. Dengan meningkatnya penggunaan teknologi Wi-Fi dan kebutuhan akan keamanan jaringan, Wi-Fi Protected Access 3 (WPA3…

Edition
-
ISBN/ISSN
--
Collation
xiv, 111 hal
Series Title
-
Call Number
2024 DAV a
Availability2
Add to basket
MARC DownloadCite
cover
Security Assessment pada Aplikasi Web Pecel Tumpang berdasarkan OWASP Web Sec…
Comment Share
Ira Rosianal HikmahTiyas YulitaDimas Febriyan Priambodo, M.Cs.Falinsa Salsabila Yursa

Dinas Komunikasi dan Informatika (Diskominfo) Kota Madiun menyediakan sebuah Aplikasi web bernama Pecel Tumpang (Pelayanan Cepat Langsung Hemat Waktu dan Gampang) yang memudahkan masyarakat untuk mengajukan surat keterangan tanpa perlu datang ke kantor kelurahan. Aplikasi web ini pernah dilakukan uji keamanan tetapi tidak terdokumentasi dan dinilai belum maksimal sehingga perlu dilakukan penguj…

Edition
-
ISBN/ISSN
--
Collation
xv, 94 hal
Series Title
-
Call Number
2024 FAL s
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?