Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 26 27 28 29 30 Next Last Page
cover
The art of computer virus research and defense
Comment Share
Szor, Peter

Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …

Edition
--
ISBN/ISSN
0321304543
Collation
xxvii, 713 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 SZO a
Availability1
Add to basket
MARC DownloadCite
cover
Malware, rootkits & botnets: a beginner's guide
Comment Share
Elisan, Christopher C.

Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …

Edition
--
ISBN/ISSN
9780071792066
Collation
xxvi, 353 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 ELI m
Availability1
Add to basket
MARC DownloadCite
cover
Legal aspects of managing technology
Comment Share
Lee Burgunder

Table of contents: 1. An overview of the technology policy environment in the United States 2. The international technology policy environment 3. Fundamental requirements for patent protection in the United States 4. Obtaining and defending patent rights in the United States and globally 5. Patent protection for computer programs and internet business methods 6. Protection of secret infor…

Edition
5st edition
ISBN/ISSN
9781439079812
Collation
xvi, 608 hal.; ilus.; 26 cm
Series Title
--
Call Number
346.48 BUR l
Availability1
Add to basket
MARC DownloadCite
cover
Computer and information security handbook
Comment Share
Vacca, John R.

Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …

Edition
Second Edition
ISBN/ISSN
9780123943972
Collation
xxviii, 1171 hal.; ilus.; 29 cm
Series Title
--
Call Number
R005.8 VAC c
Availability1
Add to basket
MARC DownloadCite
cover
Computer forensics: investigating hard disks, file and operating systems (vol…
Comment Share
Helba, Stephen

Table of contents: 1. Understanding file systems and hard disks 2. Understanding digital media devices 3. Windows, Lunux, and Macintosh boot processes 4. Windows forensics I 5. Windows forensics II 6. Linux forensics 7. Application password crackers

Edition
--
ISBN/ISSN
9781435483507
Collation
various pagings.; ilus.; 28 cm
Series Title
--
Call Number
363.25 HEL i
Availability1
Add to basket
MARC DownloadCite
cover
CEH (Certified Ethical Hacker) : 500% illegal
Comment Share
Jonny Hidayat

Daftar isi: Bagian 1 Denial of service Apa itu denial of service attack Apa itu distributed denial of service attack Teknik serangan DoS dan DDoS Botnet Tools DoS Mendeteksi serangan DoS Strategi untuk mengatasi DoS Teknik-teknik melawan botnet Langkah-langkah mencegah DoS/DDoS Proteksi DoS/DDoS di level ISP Mengaktifkan TCP intercept pada IOS cisco Perangkat keras untuk perlind…

Edition
--
ISBN/ISSN
9789791090865
Collation
viii, 252 hal.: ilus.; 21 cm
Series Title
--
Call Number
005.84 JON c
Availability2
Add to basket
MARC DownloadCite
cover
Information Technology Risk Management in enterprise Environments:a review in…
Comment Share
Jane KounsDaniel Minoli

CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…

Edition
first
ISBN/ISSN
9780471762546
Collation
xvii,421hal.;ilus.;24cm
Series Title
null
Call Number
658.4 KOU i
Availability1
Add to basket
MARC DownloadCite
cover
Critical infrastructure: homeland security and emergency preparedness
Comment Share
Radvanovsky, RobertMcDougall, Allan

Contents: ch. 1 Introduction to Critical Infrastructure Assurance and Protection 1.1.Introduction 1.2.What Is Critical Infrastructure? 1.3.What Is the Private Sector? 1.4.What Is the Public Sector? 1.5.What Is CIP? 1.6.What Is CIA? 1.7.What Are Public-Private Partnerships? 1.8.Critical Infrastructure Functions 1.9.Evolution of Critical Infrastructure ch. 2 Demand, Capacity, Fragili…

Edition
Third Edition
ISBN/ISSN
9781466503458
Collation
xv, 257 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.34 RAD c
Availability1
Add to basket
MARC DownloadCite
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?