Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 26 27 28 29 30 Next Last Page
cover
The computer incident response planning handbook: executable plans for protec…
Comment Share
McCarthy, N. K.

Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…

Edition
--
ISBN/ISSN
9780071790390
Collation
xxviii, 209 hal.; ilus.; 23 cm
Series Title
--
Call Number
R005.8 McC c
Availability1
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensics processing and procedures: meeting the requirements of ISO …
Comment Share
Watson, DavidJones, Andrew

Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…

Edition
--
ISBN/ISSN
9781597497428
Collation
xxi, 857 hal.; ilus.; 28 cm
Series Title
--
Call Number
363.25 WAT d
Availability1
Add to basket
MARC DownloadCite
cover
Computer evidence: collection and preservation
Comment Share
Brown, Christopher L. T.

Terdapat indeks. Table of Contents: Part I Computer Forensics and Evidence Dynamics 1. Computer Forensics Essentials 2. Rules of Evidence, Case Law, and Regulation 3. Evidence Dynamics Part II Information Systems 4. Interview, Policy, and Audit 5. Network Topology and Architecture 6. Volatile Data Part III Data Storage Systems and Media 7. Physical Disk Technologies 8. SAN, …

Edition
Second Edition
ISBN/ISSN
9781584506997
Collation
xxvii, 518 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
363.25 BRO c
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics: investigating and analyzing malicious code
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H

Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…

Edition
--
ISBN/ISSN
9781597492683
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 AQU j
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Harris, ShonEagle, ChrisHarper, AllenNess, JonathanLenkey, GideonWilliams, Terron

Terdapat indeks. Table of Contents: Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Dist…

Edition
Third editon
ISBN/ISSN
9780071742559
Collation
xxiv, 693 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
The CERT guide to system and network security practices
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…

Edition
--
ISBN/ISSN
020173723x
Collation
xxiv, 447 hal.; ilus; 24 cm
Series Title
SEI Series in Software Engineering
Call Number
005.8 ALL c
Availability1
Add to basket
MARC DownloadCite
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?