Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 229 from your keywords: subject="Management"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Manajemen Strategis : Formulasi, Implementasi Dan Pengendalian
Comment Share
Nia Pramita SariJohn A. Pearce IIRichard B. Robinson, Jr

Edition
12
ISBN/ISSN
9789790612563
Collation
xx, 476 hal : 21x28cm
Series Title
-
Call Number
628.481 PEA m

Edition
12
ISBN/ISSN
9789790612563
Collation
xx, 476 hal : 21x28cm
Series Title
-
Call Number
628.481 PEA m
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity risk management: an enterprise risk management approach
Comment Share
Kok-Boon OhBruce Ho

The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk management in general to raise awareness among businesses, academics, and the general public about the cyber landscape changes and challenges that are occurring with emerging threats that will affect individual and corporate information security. As a result, the …

Edition
-
ISBN/ISSN
9781685074289
Collation
xviii, 244 ; ilus :25cm
Series Title
-
Call Number
005.8 KOK c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to information systems
Comment Share
Rainer, R. KellyPrince, BradCegielski, Casey

The goal of Rainer, Introduction to Information Systems 5e is to teach all business majors, especially undergraduate ones, how to use information technology to master their current or future jobs and to help ensure the success of their organization. To accomplish this goal, this text helps students to become informed users; that is, persons knowledgeable about information systems and informatio…

Edition
Fifth edition
ISBN/ISSN
9781118808559
Collation
xv, 408 hlm.; ilus.; 25 cm
Series Title
--
Call Number
658.4038 RAI i
Availability3
Add to basket
MARC DownloadCite
cover
The Security Risk Assessment Handbook: A Complete Guide for Performing Securi…
Comment Share
Douglas J. Landoll

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of p…

Edition
Third edition
ISBN/ISSN
9781032041650
Collation
514 hal : 25 cm
Series Title
-
Call Number
R 658.47 LAN s
Availability1
Add to basket
MARC DownloadCite
cover
Management: a practical introduction
Comment Share
Kinicki, AngeloWilliams, Brian K.

Contents Part 1 Introduction 1 The exception manager: What you do, how you do it 2 2 Management theory: essential background for the successful manager Part 2 The environment of management 3 The manager’s changing work environment & ethical responsibilities: doing the right thing 4 Global management: managing across borders Part 3 Planning 5 Planning: the foundation of successfu…

Edition
Fourth Edition
ISBN/ISSN
9780071285575
Collation
xxxi, 638 hl.; ilus.; 28 cm
Series Title
--
Call Number
658 KIN m
Availability2
Add to basket
MARC DownloadCite
cover
ISO/IEC 27005 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…

Edition
Third edition
ISBN/ISSN
--
Collation
vi, 53 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27002 -- Information technology -- security techniques -- code of pra…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…

Edition
Second edition
ISBN/ISSN
--
Collation
vii, 80 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27004 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography

Edition
Second edition
ISBN/ISSN
--
Collation
v, 58 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27003 -- Information technology -- security techniques -- information…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 5 Leadership 6 Planning 7 Support 8 Operation 9 Performance evaluation 10 Improvement Annex A (informative) policy framework Bibliography

Edition
Second edition
ISBN/ISSN
--
Collation
vi, 45 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
Solving cyber risk protecting cour company and society
Comment Share
Coburn, AndrewLeverett, EireannWoo, Gordon

Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding th…

Edition
--
ISBN/ISSN
9781119490937
Collation
xii, 367 hlm.; ilus.; 24 cm
Series Title
--
Call Number
658.4036 COB s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?