Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 40 from your keywords: subject="Network Security"
First Page Previous 1 2 3 4 Next Last Page
cover
Cyberjutsu: cybersecurity for the modern ninja
Comment Share
McCarty, Ben

Table of Contents Chapter 1: Mapping Networks Chapter 2: Guarding with Special Care Chapter 3: Xenophobic Security Chapter 4: Identification Challenges Chapter 5: Double-Sealed Password Chapter 6: Hours of Infiltration Chapter 7: Access to Time Chapter 8: Tools Chapter 9: S

Edition
-
ISBN/ISSN
9781718500549
Collation
xxvii, 231 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 MCC c
Availability1
Add to basket
MARC DownloadCite
cover
Network:tweaking dan hacking: trik menjelajahi jaringan yang jarang diungkapkan
Comment Share
Efvy Zam

Daftar isi: Bab 1 Otak-atik jaringan dengan command prompt Bab 2 Menjelajah jaringan Bab 3 Otak-atik jaringan wireless Bab 4 Mencari sinyal kuat jaringan wireless Bab 5 Memutuskan koneksi internet komputer lain Bab 6 Menembus blokir internet dengan duplikasi MAC address Bab 7 Membuka jaringan wireless yang tersembunyi Bab 8 Mendeteksi spoofing Bab 9 Mengontrol bandwidth dan …

Edition
-
ISBN/ISSN
9786020497082
Collation
ix, 204 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 EFV n
Availability4
Add to basket
MARC DownloadCite
cover
Cybersecurity the essential body of knowledge
Comment Share
Conklin, Wm. ArthurShoemaker, Dan

1. Information Security is Important. 2. A Global Road Map for Security 3. Adapting Best Practice: Tailoring a Solution that Fits 4. Defining the Company's Executive Roles 5. Defining the Company's Functional Security Roles 6. Defining the Corollary Roles for Security 7. The Data Security Competency 8. The Digital Forensics Competency 9. The Enterprise Continuity Competency 10. The Inc…

Edition
--
ISBN/ISSN
9781435481695
Collation
xviv, 499 hal.; ilus.; 24cm.
Series Title
--
Call Number
005.8 SHO c
Availability3
Add to basket
MARC DownloadCite
cover
Buku pintar teknik hacking
Comment Share
Java CreativityDedik Kurniawan

Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip …

Edition
Pertama
ISBN/ISSN
9786020219370
Collation
xi, 264 hlm.; ilus.; 21 cm + 1 DVD
Series Title
--
Call Number
005.84 DED b
Availability2
Add to basket
MARC DownloadCite
cover
Kriptografi untuk keamanan jaringan
Comment Share
Rifki Sadikin

Daftar isi: 1 Pengantar Kriptografi dan Keamanan Jaringan 2 Kriptografi Klasik 3 Matematika untuk Kriptografi Kunci Simetri 4 Data Encryption System (DES) 5 Advanced Encryption Standard (AES) 6 Mode Operasi, dan Sistem Sandi Stream 7 Teori Bilangan untuk Kriptografi Kunci Publik 8 Sistem Kriptografi Kunci Publik 9 Fungsi Hash untuk Kriptografi 10 Digital Signature

Edition
Ed. I
ISBN/ISSN
9789792931280
Collation
xx, 392 hal.: ilus.; 23 cm
Series Title
--
Call Number
005.82 RIF k
Availability10
Add to basket
MARC DownloadCite
cover
Trik bobol jaringan wireless
Comment Share
Asimov, IsaacKingsolver, BarbaraMunadzir MF

Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filt…

Edition
null
ISBN/ISSN
9786022881575
Collation
212 hlm.; ilus.; 21 cm.
Series Title
null
Call Number
005.84 MUN t
Availability1
Add to basket
MARC DownloadCite
cover
Kriptografi keamanan internet dan jaringan komunikasi
Comment Share
Okumura, ToshieWiryosumarto, HarsonoYusuf Kurniawan

DAFTAR ISI:
1. Pendahuluan
Komunikasi
Aspek-aspek keamanan
Algoritma dan kunci
Cryptanalysis
Macam-macam algoritma kriptografi
Macam-macam serangan cryptanalyst
Keamanan algoritma
2. Algoritma kriptografi klasik
Teknik subtitusi
Subtitusi deret campuran kata kunci
Subtitusi monomer-dinome-trinome
Subtitusi multilatera…

Edition
null
ISBN/ISSN
9793338164
Collation
x, 316 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 YUS k
Availability1
Add to basket
MARC DownloadCite
cover
The network security test lab: a step-by-step guide
Comment Share
Gregg, Michael

CONTENTS: 1. Building a Hardware and Software Test Platform 2. Passive Information Gathering 3. Analyzing Network Traffic 4. Detecting Live Systems and Analyzing Results 5. Enumerating Systems 6. Automating Encryption and Tunneling Techniques 7. Automated Attack and Penetration Tools 8. Securing Wireless Systems 9. An Introduction to Malware 10. Detecting Intrusions and Analyzing Malw…

Edition
--
ISBN/ISSN
9781118987056
Collation
xxiv, 454 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 GRE n
Availability3
Add to basket
MARC DownloadCite
cover
Hacking for dummies
Comment Share
Beaver, Kevin

Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…

Edition
6th Edition
ISBN/ISSN
9781119485476
Collation
xiv, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 BEA h
Availability1
Add to basket
MARC DownloadCite
cover
Security for web services and service-oriented architectures
Comment Share
Bertino, ElisaMartino, LorenzoPaci, FedericaSquicciarini, Anna

Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends

Edition
--
ISBN/ISSN
9783540877417
Collation
xii, 226 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BER s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?