Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
Cyber attacks: protecting national infrastructure
Comment Share
Amoroso, Edward G.

Table of Contents Preface Acknowledgments 1. Introduction National Cyber Threats, Vulnerabilities, and Attacks Botnet Threat National Cyber Security Methodology Components Deception Separation Diversity Consistency Depth Discretion Collection Correlation Awareness Response Implementing the Principles Nationally Protecting the Critical National Infrastructure Against Cyber …

Edition
1st edition
ISBN/ISSN
9780123849175
Collation
xi, 233 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 AMO c
Availability2
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, Steve

TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…

Edition
First edition
ISBN/ISSN
9780470097625
Collation
xxii, 530 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m2
Availability1
Add to basket
MARC DownloadCite
cover
Windows forensic analysis DVD toolkit
Comment Share
Casey, EoghanCarvey, Harlan A.

Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget

Edition
Second edition
ISBN/ISSN
9781597494229
Collation
xxiv, 482 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
363.25 CAR w
Availability1
Add to basket
MARC DownloadCite
cover
Securing the cloud: cloud computer security techniques and tactics
Comment Share
Winkler, Vic J.R.

Contents CHAPTER 1 Introduction to Cloud Computing and Security 1 Understanding Cloud Computing 1 Cloud Scale, Patterns, and Operational Efficiency 2 A Synergistic Trick 3 Elasticity, Shape Shifting, and Security 3 The IT Foundation for Cloud 4 Cloud Computing as Foundation for Cloud Services 5 Cloud Computing Qualities 7 The Bottom Line 8 An Historical View: Roots of Cloud Comp…

Edition
--
ISBN/ISSN
9781597495929
Collation
xxiv, 290 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.6782 WIN s
Availability2
Add to basket
MARC DownloadCite
cover
The basics of hacking and penetration testing: ethical hacking and penetratio…
Comment Share
Engebretson, Patrick

Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test

Edition
1st edition
ISBN/ISSN
9781597496551
Collation
xvii, 159 hal.; ilus.; 24 cm
Series Title
Syngress the basics
Call Number
005.84 ENG b
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's guide to OS X: exploiting OS X from the root up
Comment Share
Bathurst, RobertRogers, RussGhassemlouei, Alijohn

Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…

Edition
1st edition
ISBN/ISSN
9781597499507
Collation
x, 235 hal.; illus.; 24 cm
Series Title
--
Call Number
005.84 BAT h
Availability1
Add to basket
MARC DownloadCite
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Professional penetration testing: creating and operating a formal hacking lab
Comment Share
Wilhelm, Thomas

Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…

Edition
1st edition
ISBN/ISSN
9781597494250
Collation
xix, 504 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 WIL p
Availability1
Add to basket
MARC DownloadCite
cover
System forensics, investigation, and response
Comment Share
Vacca, John R.Rudolph, K.

Table of contents: 1. The system forensics landscape 2. System forensics fundamentals 3. Overview of computer crime 4. Challenges of system forensics 5. Forensics methods and labs 6. Technical overview: system forensics tools, techniques, and methods 7. System forensics technologies 8. Controlling a forensic investigation 9. Collecting, seizing, and protecting evidence 10. Understan…

Edition
--
ISBN/ISSN
9780763791346
Collation
xv, 339 hal.; ilus.; 24 cm
Series Title
Information systems security &​ assurance series
Call Number
363.25 VAC s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?