Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 64 from your keywords: subject="Software"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Implementasi serangan A5/1 Rainbow Table studi kasus: uji kerawanan keamanan …
Comment Share
Mohamad SyahralRini Wisnu WardhaniArizalAlwan Muhammad Fajar

GSM (Global System for Mobile) sudah tersebar ke seluruh daerah dan diprediksi mencapai 4 milyar pengguna. Short Messaging Service (SMS) digunakan untuk komunikasi yang dipakai oleh semua kalangan. SMS-based One-Time Passwords banyak digunakan untuk autentikasi multifaktor. Pemanfaatan teknologi SMS OTP diterapkan pada berbagai bidang, yakni bidang perbankan dan media sosial. Ketika kode SMS OT…

Edition
--
ISBN/ISSN
--
Collation
????161 hlm
Series Title
-
Call Number
2021 ALW i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi skema SecLaaS-RW dalam membuat aplikasi secure logging
Comment Share
Setiyo CahyonoSeptia Ulfa SunaringtyasJeckson SidabutarGiovanni Victo Araya

Kegiatan pengumpulan log file (logging) dan analisis log file sangat diperlukan oleh setiap organisasi. Oleh karena itu setiap organisasi dianjurkan untuk membangun infrastruktur log meliputi software, hardware, jaringan, dan media untuk melakukan kegiatan seperti, pembangikitan, penyimpanan, analisis, hingga penghapusan log. Namun, dalam membuat infrastruktur log tersebut tidak mudah. Terdapat…

Edition
--
ISBN/ISSN
--
Collation
xiv, 124 hlm
Series Title
-
Call Number
2021 GIO i
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptography in .Net and Azure key vault : a practical guide to encry…
Comment Share
Haunts, Stephen

Edition
-
ISBN/ISSN
9781484243749
Collation
xviii, 228 hlm.: ill.; 25 cm
Series Title
-
Call Number
005.1 HAU a

Edition
-
ISBN/ISSN
9781484243749
Collation
xviii, 228 hlm.: ill.; 25 cm
Series Title
-
Call Number
005.1 HAU a
Availability1
Add to basket
MARC DownloadCite
cover
Automatic malware analysis: an emulator based approach
Comment Share
Yin, HengSong, Dawn

Table of contents: 1. Introduction 2. Dynamic Binary Analysis Platform 3. Hidden Code Extraction 4. Privacy-breaching Behavior Analysis 5. Hooking Behavior Analysis 6. Analysis of trigger conditions and hidden behaviors 7. Concluding remarks

Edition
--
ISBN/ISSN
9781461455226
Collation
ix, 73 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 YIN a
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics field guide for Windows systems: digital forensics field gu…
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H.Rose, Curtis W.

Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…

Edition
--
ISBN/ISSN
9781597494724
Collation
xxxviii, 518 hal.; ilus.; 23cm
Series Title
--
Call Number
005.84 MAL m
Availability2
Add to basket
MARC DownloadCite
cover
Data analysis with open source tools
Comment Share
Janert, Philipp K.

Terdapat indeks. Table of Contents: Chapter 1 Introduction Chapter 2 A Single Variable: Shape and Distribution Chapter 3 Two Variables: Establishing Relationships Chapter 4 Time As a Variable: Time-Series Analysis Chapter 5 More Than Two Variables: Graphical Multivariate Analysis Chapter 6 Intermezzo: A Data Analysis Session Chapter 7 Guesstimation and the Back of the Envelope Chapte…

Edition
First edition
ISBN/ISSN
9780596802356
Collation
xviii, 509 hal.; ilus.; 24 cm
Series Title
--
Call Number
006.312 JAN d
Availability1
Add to basket
MARC DownloadCite
cover
Malware detection
Comment Share
Wang, CliffSong, DawnChristodorescu, MihaiJha, SomeshMaughan, Douglas

Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…

Edition
--
ISBN/ISSN
9781441940957
Collation
xi, 311 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.84 CHR m
Availability2
Add to basket
MARC DownloadCite
cover
CMMI for acquisition: guidelines for improving the acquisition of products an…
Comment Share
Shrum, SandyGallagher, Brian P.Philips, MikeRichter, Karen J.

Terdapat indeks. Table of Contents: Part One: About CMMI for Acquisition Chapter 1: Introduction Chapter 2: Process Area Components Chapter 3: Tying It All Together Chapter 4: Relationships Among Process Areas Chapter 5: Using CMMI Models Chapter 6: Essays on CMMI-ACQ in Government and Industry Part Two: Generic Goals and Generic Practices, and the Process Areas Part Three: The …

Edition
Second edition
ISBN/ISSN
9780321711519
Collation
xxi, 603 hal.; ilus.; 24 cm
Series Title
SEI series in software engineering
Call Number
005.1 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
CMMI for development: guidelines for process integration and product improvement
Comment Share
Chrissis, Mary BethKonrad, MikeShrum, Sandy

Table of Contents List of Perspectives xiii Preface xv Book Acknowledgments xxi Part One: About CMMI for Development 1 Chapter 1: Introduction 3 About Process Improvement 4 About Capability Maturity Models 9 Evolution of CMMI 10 CMMI Framework 14 CMMI for Development 18 Chapter 2: Process Area Components 19 Core Process Areas and CMMI Models 19 Required, Expected, and Info…

Edition
Third Edition
ISBN/ISSN
9780321711502
Collation
xxiv, 650 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHR c
Availability1
Add to basket
MARC DownloadCite
cover
Malware analyst's cookbook and DVD: tools and techniques for fighting malicio…
Comment Share
Ligh, Michael HaleAdair, StevenHartstein, BlakeRichard, Matthew

Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…

Edition
--
ISBN/ISSN
9780470613030
Collation
xxi, 716 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
005.84 LIG m
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?