Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Code and other laws of cyberspace
Comment Share
Lessig, Lawrence

Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…

Edition
First edition
ISBN/ISSN
0465039138
Collation
xii, 297 hal 25 cm
Series Title
--
Call Number
343 LES c
Availability1
Add to basket
MARC DownloadCite
cover
Privacy law in a nutshell
Comment Share
Soma, John T.Rynerson, Stephen D.

Contents: Ch. I - History and definitions Ch. II - U.S. legal basis of privacy Ch. III - International privacy Ch. IV - Current privacy challenges, developing technologies &​ future trends.

Edition
First edition
ISBN/ISSN
9780314181343
Collation
xx, 365 hal.; 19 cm
Series Title
--
Call Number
342.7308 SOM p
Availability1
Add to basket
MARC DownloadCite
cover
Malware detection
Comment Share
Wang, CliffSong, DawnChristodorescu, MihaiJha, SomeshMaughan, Douglas

Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…

Edition
--
ISBN/ISSN
9781441940957
Collation
xi, 311 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.84 CHR m
Availability2
Add to basket
MARC DownloadCite
cover
Law in cyber space
Comment Share
Commonwealth Secretariat

A. Background B. Report of the Expert Working Group on Legal Aspects of Information Technology and the Related Law of Evidence (London 26-30 June 2000) Pt. 1. Additions/​Changes to UNCITRAL Model Law. 1. Issues arising from Chapter I of Model Law. 2. Issues arising from Chapter II of UNCITRAL Model Law. 3. Issues arising out of Chapter III of the UNCITRAL Model Law. 4. Issues …

Edition
--
ISBN/ISSN
0850926580
Collation
142 hal.; 22 cm
Series Title
--
Call Number
343 COM l
Availability1
Add to basket
MARC DownloadCite
cover
Intrution detection system to detect web anomalies: a novel approach to perfo…
Comment Share
Anandh, Sumi

Table of contents: 1. Introduction Basic of intrusions and intrusion detection Introduction of intrusion detection systems Introduction to anomalies and signatures Anomaly detection systems Intrusion detection technology Techniques for intrusion detection 2. Literature study Intrusion detection systems Intrusion - Attackers and the attecked Dimensions of intrusion …

Edition
--
ISBN/ISSN
9783846596883
Collation
ix, 78 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.8 ANA i
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection and correlation: challenges and solutions
Comment Share
Kruegel, ChristopherValeur, FredrikVigna, Giovanni

Terdapat bibliografi dan indeks. Table of contents: 1. Introduction 2. Computer security and intrusion detection 3. Alert correlation 4. Alert collection 5. Alert aggregation and verification 6. High-level alert structures 7. Large-scale correlation 8. Evaluation 9. Open issues 10. Conclusions.

Edition
--
ISBN/ISSN
9781441936240
Collation
xiv, 118 hal.; ilus.; 24 cm
Series Title
Advances in information security
Call Number
005.8 KRU i
Availability1
Add to basket
MARC DownloadCite
cover
Hacking exposed computer forensics: secrets & solutions
Comment Share
Philipp, AaronCowen, DavidDavis, Chris

Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…

Edition
Second edition
ISBN/ISSN
9780071626774
Collation
xxiv, 518 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PHI h
Availability1
Add to basket
MARC DownloadCite
cover
Learning PHP, MySQL, JavaScript, and CSS
Comment Share
Nixon, Robin

Terdapat bibliografi dan indeks. Table of contents: 1. Introduction to dynamic web content 2. Setting up a development server 3. Introduction to PHP 4. Expressions and control flow in PHP 5. PHP functions and objects 6. PHP arrays 7. Practical PHP 8. Introduction to MySQL 9. Mastering MySQL 10. Accessing MySQL using PHP 11. From handling 12. Cookies, sessions, and authentication …

Edition
Second edition
ISBN/ISSN
9781449319267
Collation
xxi, 556 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.262 NIX l
Availability1
Add to basket
MARC DownloadCite
cover
Inside network perimeter security
Comment Share
Northcutt, StephenZeltser, LennyWinters, ScottKent, KarenRitchey, Ronald W.

Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…

Edition
Second edition
ISBN/ISSN
0672327376
Collation
xxxii, 734 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR i
Availability2
Add to basket
MARC DownloadCite
cover
Security monitoring
Comment Share
Fry, ChrisNystrom, Martin

Terdapat indeks. Table of Contents: 1. Getting Started 2. Implement Policies for Monitoring 3. Know Your Network 4. Select Targets for Monitoring 5. Choose Event Sources 6. Feed and Tune 7. Maintain Dependable Event Sources 8. Conclusion: Keeping It Real

Edition
First edition
ISBN/ISSN
9780596518165
Collation
xv, 227 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 FRY s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?