Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Reversing: secrets of reverse engineering
Comment Share
Eilam, Eldad

Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…

Edition
--
ISBN/ISSN
9780764574818
Collation
xxviii, 589 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 EIL r
Availability1
Add to basket
MARC DownloadCite
cover
Nmap cookbook: the fat-free guide to network scanning
Comment Share
Marsh, Nicholas

Table of contents: Section 1 Installing Nmap Section 2 Basic Scanning Techniques Section 3 Discovery Options Section 4 Advanced Scanning Options Section 5 Port Scanning Options Section 6 Operating System and Service Detection Section 7 Timing Options Section 8 Evading Firewalls Section 9 Output Options Section 10 Troubleshooting and Debugging Section 11 Ze…

Edition
--
ISBN/ISSN
1449902529
Collation
196 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MAR n
Availability1
Add to basket
MARC DownloadCite
cover
Data mining tools for malware detection
Comment Share
Masud, MehedyKhan, LatifurThuraisingham, Bhavani M

Table of contents: ch. 1 Introduction 1.1.Trends 1.2.Data Mining and Security Technologies 1.3.Data Mining for Email Worm Detection 1.4.Data Mining for Malicious Code Detection 1.5.Data Mining for Detecting Remote Exploits 1.6.Data Mining for Botnet Detection 1.7.Stream Data Mining 1.8.Emerging Data Mining Tools for Cyber Security Applications 1.9.Organization of This Book 1.10.Nex…

Edition
--
ISBN/ISSN
9781439854549
Collation
xxx, 419 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 MAS d
Availability1
Add to basket
MARC DownloadCite
cover
The web application hacker’s handbook: finding and exploiting security flaws
Comment Share
Stuttard, DafyddPinto, Marcus

Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…

Edition
Second Edition
ISBN/ISSN
9781118026472
Collation
xxxiii, 878 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 STU w
Availability3
Add to basket
MARC DownloadCite
cover
The hacker's handbook: the strategy behind breaking into and defending networks
Comment Share
Young, SusanAitel, Dave

Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …

Edition
--
ISBN/ISSN
0849308887
Collation
xxxiv, 860 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 YOU h
Availability1
Add to basket
MARC DownloadCite
cover
Securing cloud and mobility: a practitioner's guide
Comment Share
Lim, IanHourani, PaulCoolidge, E. Coleen

Table of contents: pt. I Rethinking IT and Security ch. 1 Tectonic Shifts 1.1.Disruptive Forces 1.2.Deconstructing Cloud Computing 1.2.1.NIST Definition 1.2.2.The Three Service Models 1.2.3.The Four Deployment Models 1.3.The Rise of Mobility 1.4.New IT ch. 2 The Evolving Threat Landscape 2.1.From Cryptographers to World Leaders 2.2.The Changing Threat Landscape 2.3.Hacktivist…

Edition
--
ISBN/ISSN
9781439850558
Collation
xvii, 210 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LIM s
Availability1
Add to basket
MARC DownloadCite
cover
The CERT Oracle secure coding standard for Java
Comment Share
Long, FredMohindra, DhruvSeacord, Robert C.Sutherland, Dean F.Svoboda, David

Table of contents: ch. 1 Introduction ch. 2 Input Validation and Data Sanitization (IDS) ch. 3 Declarations and Initialization (DCL) ch. 4 Expressions (EXP) ch. 5 Numeric Types and Operations (NUM) ch. 6 Object Orientation (OBJ) ch. 7 Methods (MET) ch. 8 Exceptional Behavior (ERR) ch. 9 Visibility and Atomicity (VNA) ch. 10 Locking (LCK) ch. 11 Thread APIs (THI) ch. 12 Thread P…

Edition
--
ISBN/ISSN
9780321803955
Collation
xxxiv, 699 hal.; ilus.; 23 cm
Series Title
The SEI series in software engineering
Call Number
005.8 LON c
Availability1
Add to basket
MARC DownloadCite
cover
Malware: fighting malicious code
Comment Share
Skoudis, EdZeltser, Lenny

Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion

Edition
1st edition
ISBN/ISSN
9780131014053
Collation
xxii, 647 hal.; ilus.; 23 cm
Series Title
Prentice Hall series in computer networking and distributed systems
Call Number
005.84 SKO m
Availability1
Add to basket
MARC DownloadCite
cover
Securing VoIP networks: threats, vulnerabilities, and countermeasures
Comment Share
Thermos, PeterTakanen, Ari

Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpri…

Edition
--
ISBN/ISSN
0321437349
Collation
xxiii, 359 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.695 THE s
Availability1
Add to basket
MARC DownloadCite
cover
Snort cookbook
Comment Share
Orebaugh, AngelaBiles, SimonBabbin, Jacob

Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …

Edition
1st edition
ISBN/ISSN
0596007914
Collation
xiii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ORE s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?