Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Practical intrusion analysis: prevention and detection for the twenty-first c…
Comment Share
Trost, Ryan

Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…

Edition
--
ISBN/ISSN
9780321591807
Collation
xxiv, 455 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 TRO p
Availability2
Add to basket
MARC DownloadCite
cover
HTML & CSS: design and building websites
Comment Share
Duckett, Jon

Terdapat indeks Table of contents: Introduction 2 Chapter 1: Structure 12 Chapter 2: Text 40 Chapter 3: Lists 62 Chapter 4: Links 74 Chapter 5: Images 94 Chapter 6: Tables 126 Chapter 7: Forms 144 Chapter 8: Extra Markup 176 Chapter 9: Flash, Video & Audio 200 Chapter 10: Introducing CSS 226 Chapter 11: Color 246 Chapter 12: Text 264 Chapter 13: Boxes 300 Chapter 14: Lists, Ta…

Edition
first
ISBN/ISSN
9781118008188
Collation
471 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.262 DUC h
Availability2
Add to basket
MARC DownloadCite
cover
Nmap in the enterprise: your guide to network scanning
Comment Share
Orebaugh, Angela

Terdapat indeks. Table of contents: Chapter 1: Introducing Network Scanning Chapter 2: Introducing Nmap Chapter 3: Using Nmap Chapter 4: Fingerprinting with Nmap Chapter 5: Detection and Evasion with Nmap Chapter 6: Scanning in the Real World Chapter 7: Tooling Around with Nmap Chapter 7: Nmap scanning in the real world

Edition
1st edition
ISBN/ISSN
9781597492416
Collation
xiii, 245 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ORE n
Availability1
Add to basket
MARC DownloadCite
cover
Client-side attacks and defense
Comment Share
Shimonski, RobertOriyano, Sean-Philip

Terdapat indeks. Table of contents: Chapter 1. Client-Side Attacks Defined Client-Side Attacks: An Overview Types of Client-Side Attacks Chapter 2. Dissection of a Client-Side Attack What Constitutes a Client-Side Attack? Chapter 3. Protecting Web Browsers Common Functions of a Web Browser Microsoft Internet Explorer Mozilla Firefox Google Chrome Apple Safari Op…

Edition
--
ISBN/ISSN
9781597495905
Collation
xii, 278 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Placing the suspect behind the keyboard: using digital forensics and investig…
Comment Share
Carvey, HarlanShavers, Brett

Table of Contents Chapter 1. Introduction Digital Evidence Collection Simple File Copying “Dead Box” Approaches “Live Box” Approaches Decision-Making FlowChart Preview/Triage SmartPhones and Cellular Devices Chapter 2. High Tech Interview Introduction The Main Goal of Questioning a Suspect The Line of Questions for Suspects Questions for Victims Questions for Network Adm…

Edition
--
ISBN/ISSN
9781597499859
Collation
xxii, 267 hal.; ilus.; 25 cm
Series Title
--
Call Number
363.25 SHA p
Availability1
Add to basket
MARC DownloadCite
cover
Rekayasa perangkat lunak: terstruktur dan berorientasi objek
Comment Share
M. ShalahuddinRosa A. S.

Daftar isi: 1 Pendahuluan 1.1 Perangkat Lunak 1.2 Rekayasa Perangkat Lunak 1.3 Proses Rekayasa Perangkat Lunak 1.4 Teknologi Informasi Sosial 2 Analisis dan Desain Sistem 2.1 Definisi Analisis Sistem 2.2 Teknik Pengumpulan Data 2.3 Jenis Kebutuhan 2.4 Definisi Desain Sistem 3 SDLC 3.1 Pengertian SDLC 3.2 Model SDLC 4 Basis Data 4.1 Pengerti…

Edition
Ed. I
ISBN/ISSN
9786021514054
Collation
viii, 296 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.36 ROS r
Availability18
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
English grammar: tata bahasa Inggris
Comment Share
Akhmad Kardimin

Daftar isi: To be (kata bantu kata kerja) Adverbs (kata keterangan) Active dan passive voice kalimat aktif dan pasif Impersonal it A article (kata sanding a, an dan the) Infinitive Gerund Direct and indirect speech (kalimat langsung dan kalimat tidak langsung) Noun (kalimat benda atau nomina) Comparison of adjective The eight parts of speech (delapan bagian jenis kata) Pronoun (ka…

Edition
Cetakan VI
ISBN/ISSN
9793477024
Collation
vii, 372 hal.; ilus.; 23 cm
Series Title
--
Call Number
425 AKH e
Availability1
Add to basket
MARC DownloadCite
cover
The basics of web hacking: tools and techniques to attack the web
Comment Share
Pauli, Joshua J.

Contents : Chapter 1: The Basics of Web Hacking Chapter 2: Web Server Hacking Chapter 3: Web Application Recon and Scanning Chapter 4: Web Application Exploitation with Injection Chapter 5: Web Application Exploitation with Broken Authentication Chapter 6: Web Using Hacking Chapter 7: Fixes Chapter 8: Nets Steps

Edition
--
ISBN/ISSN
9780124166004
Collation
xiii, 145 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PAU b
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?