Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 21 22 23 24 25 Next Last Page
cover
The computer incident response planning handbook: executable plans for protec…
Comment Share
McCarthy, N. K.

Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…

Edition
--
ISBN/ISSN
9780071790390
Collation
xxviii, 209 hal.; ilus.; 23 cm
Series Title
--
Call Number
R005.8 McC c
Availability1
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Writing secure code
Comment Share
Howard, Michael

Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…

Edition
Second Edition
ISBN/ISSN
0735617228
Collation
xxviii, 768 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 HOW w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics: investigating and analyzing malicious code
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H

Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…

Edition
--
ISBN/ISSN
9781597492683
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 AQU j
Availability1
Add to basket
MARC DownloadCite
cover
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
Comment Share
Kubasiak, Ryan RMorrissey, SeanVarsalone, JesseBarr, WalterBrown, James KellyCaceres, MaxChasman, MikeCornell, James

Terdapat indeks. Table of contents: 1. Tiger and Leopard Mac OS X operating systems 2. Getting a handle on Mac hardware 3. Mac disks and partitioning 4. HFS plus file system 5. FileVault 6. Time machine 7. Acquiring forensic images 8. Recovering browser history 9. Recovery of e-mail artifacts, iChat, and other chat logs 10. Locating and recovering photos 11. Finding and recovering…

Edition
--
ISBN/ISSN
9781597492973
Collation
xix, 551 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 KUB m
Availability1
Add to basket
MARC DownloadCite
cover
Malware analyst's cookbook and DVD: tools and techniques for fighting malicio…
Comment Share
Ligh, Michael HaleAdair, StevenHartstein, BlakeRichard, Matthew

Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…

Edition
--
ISBN/ISSN
9780470613030
Collation
xxi, 716 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
005.84 LIG m
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Harris, ShonEagle, ChrisHarper, AllenNess, JonathanLenkey, GideonWilliams, Terron

Terdapat indeks. Table of Contents: Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Dist…

Edition
Third editon
ISBN/ISSN
9780071742559
Collation
xxiv, 693 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
The CERT guide to system and network security practices
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…

Edition
--
ISBN/ISSN
020173723x
Collation
xxiv, 447 hal.; ilus; 24 cm
Series Title
SEI Series in Software Engineering
Call Number
005.8 ALL c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?