Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Formal correctness of security protocols
Comment Share
Maurer, UeliBella, Giampaolo

Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…

Edition
--
ISBN/ISSN
9783540681342
Collation
xviii, 274 hlm.; 24 cm.
Series Title
--
Call Number
005.8 BEL f
Availability2
Add to basket
MARC DownloadCite
cover
Internet law: text and materials
Comment Share
Reed, Chris

Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…

Edition
Second Edition
ISBN/ISSN
9780521605229
Collation
xliv, 328hal.; ilus.; 23 cm
Series Title
Law in context
Call Number
343.41 REE i
Availability1
Add to basket
MARC DownloadCite
cover
The digital person: technology and privacy in the information age
Comment Share
Solove, Daniel J.

Table of contents: 1. Introduction 2. The rise of the digital dossier 3. Kafka and Orwell : reconceptualizing information privacy 4. The problems of information privacy law 5. The limits of market-based solutions 6. Architecture and the protection of privacy 7. The problem of public records 8. Access and aggregation : rethinking privacy and transparency 9. Government information gathe…

Edition
1st edition
ISBN/ISSN
0814798462
Collation
xii, 282 hal.; 24 cm
Series Title
--
Call Number
342.7308 SOL d
Availability1
Add to basket
MARC DownloadCite
cover
Readings in cyberethics
Comment Share
Tavani, Herman TSpinello, Richard A

Table of contents: Ch. 1. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Ch. 2. Regulating the Net: Free Expression and Content Controls Ch. 3. Intellectual Property in Cuberspace Ch. 4. Privacy in Cyberspace Ch. 5. Security and Crime in Cyberspace Ch. 6. Professional Ethics, Codes of Conduct, and Computer/​Information Pro…

Edition
Second Edition
ISBN/ISSN
9780763724108
Collation
xviii, 697 hal.; ilus.; 23 cm
Series Title
--
Call Number
175 SPI r
Availability1
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, SteveJohnson, RyanPearson, Scott

Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…

Edition
Second Edition
ISBN/ISSN
9781118163825
Collation
xxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m
Availability1
Add to basket
MARC DownloadCite
cover
Law and disorder in cyberspace: abolish the FCC and let common law rule the t…
Comment Share
Huber, Peter

Table of contents: 1. Introduction 2. Technologies of Freedom 3. The Commission 4. Into the Labyrinth 5. Cable 6. The Airwaves Unbound 7. Wire Unbound 8. Busting Trusts 9. The Ascent of Competition 10. Pricing 11. Universal Service 12. Common Carriage 13. Reassembling the Pieces 14. Free Speech 15. Speech for Sale 16. Privacy 17. A People's C…

Edition
--
ISBN/ISSN
0195116143
Collation
xv, 265 hal.; ilus.; 24 cm
Series Title
--
Call Number
343.7309 HUB l
Availability1
Add to basket
MARC DownloadCite
cover
Nmap cookbook: the fat-free guide to network scanning
Comment Share
Marsh, Nicholas

Table of contents: Section 1 Installing Nmap Section 2 Basic Scanning Techniques Section 3 Discovery Options Section 4 Advanced Scanning Options Section 5 Port Scanning Options Section 6 Operating System and Service Detection Section 7 Timing Options Section 8 Evading Firewalls Section 9 Output Options Section 10 Troubleshooting and Debugging Section 11 Ze…

Edition
--
ISBN/ISSN
1449902529
Collation
196 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MAR n
Availability1
Add to basket
MARC DownloadCite
cover
The rootkit arsenal: escape and evasion in the dark corners of the system
Comment Share
Blunden, Bill

Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…

Edition
1st edition
ISBN/ISSN
9781598220612
Collation
xxvii, 908 hal.; ilus;; 23 cm
Series Title
--
Call Number
005.8 BLU r
Availability1
Add to basket
MARC DownloadCite
cover
Data mining tools for malware detection
Comment Share
Masud, MehedyKhan, LatifurThuraisingham, Bhavani M

Table of contents: ch. 1 Introduction 1.1.Trends 1.2.Data Mining and Security Technologies 1.3.Data Mining for Email Worm Detection 1.4.Data Mining for Malicious Code Detection 1.5.Data Mining for Detecting Remote Exploits 1.6.Data Mining for Botnet Detection 1.7.Stream Data Mining 1.8.Emerging Data Mining Tools for Cyber Security Applications 1.9.Organization of This Book 1.10.Nex…

Edition
--
ISBN/ISSN
9781439854549
Collation
xxx, 419 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 MAS d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?