Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Digital forensics for handheld devices
Comment Share
Doherty, Eamon P

Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …

Edition
--
ISBN/ISSN
9781439898772
Collation
xxvii, 303 hal.; ilus.; 27 cm
Series Title
--
Call Number
363.25 DOH d
Availability1
Add to basket
MARC DownloadCite
cover
Guide to computer forensics and investigations
Comment Share
Steuart, ChristopherNelson, BillPhillips, Amelia

Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …

Edition
Fourth Edition
ISBN/ISSN
9781435498839
Collation
xxv, 682 hal.; ilus.; 24 cm + 1 DVD-ROM
Series Title
--
Call Number
005.8 NEL g
Availability1
Add to basket
MARC DownloadCite
cover
Buku pintar teknik hacking
Comment Share
Dedik KurniawanJava Creativity

Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip …

Edition
Pertama
ISBN/ISSN
9786020219370
Collation
xi, 264 hlm.; ilus.; 21 cm + 1 DVD
Series Title
--
Call Number
005.84 DED b
Availability2
Add to basket
MARC DownloadCite
cover
Kriptografi untuk keamanan jaringan
Comment Share
Rifki Sadikin

Daftar isi: 1 Pengantar Kriptografi dan Keamanan Jaringan 2 Kriptografi Klasik 3 Matematika untuk Kriptografi Kunci Simetri 4 Data Encryption System (DES) 5 Advanced Encryption Standard (AES) 6 Mode Operasi, dan Sistem Sandi Stream 7 Teori Bilangan untuk Kriptografi Kunci Publik 8 Sistem Kriptografi Kunci Publik 9 Fungsi Hash untuk Kriptografi 10 Digital Signature

Edition
Ed. I
ISBN/ISSN
9789792931280
Collation
xx, 392 hal.: ilus.; 23 cm
Series Title
--
Call Number
005.82 RIF k
Availability10
Add to basket
MARC DownloadCite
cover
Trik bobol jaringan wireless
Comment Share
Asimov, IsaacKingsolver, BarbaraMunadzir MF

Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filt…

Edition
null
ISBN/ISSN
9786022881575
Collation
212 hlm.; ilus.; 21 cm.
Series Title
null
Call Number
005.84 MUN t
Availability1
Add to basket
MARC DownloadCite
cover
Kriptografi keamanan internet dan jaringan komunikasi
Comment Share
Okumura, ToshieWiryosumarto, HarsonoYusuf Kurniawan

DAFTAR ISI:
1. Pendahuluan
Komunikasi
Aspek-aspek keamanan
Algoritma dan kunci
Cryptanalysis
Macam-macam algoritma kriptografi
Macam-macam serangan cryptanalyst
Keamanan algoritma
2. Algoritma kriptografi klasik
Teknik subtitusi
Subtitusi deret campuran kata kunci
Subtitusi monomer-dinome-trinome
Subtitusi multilatera…

Edition
null
ISBN/ISSN
9793338164
Collation
x, 316 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 YUS k
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber safety: computer and mobile device safety made easy
Comment Share
Sammons, JohnCross, Michael

Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …

Edition
--
ISBN/ISSN
9780124166509
Collation
xv, 237 hal.; ilus.; 23 cm.
Series Title
--
Call Number
005.8 SAM b
Availability1
Add to basket
MARC DownloadCite
cover
Security convergence: managing enterprise security risk
Comment Share
Tyson, Dave

Table of contents Section 1 Security to date 1. What Is Security Convergence? 2. Why sould you care? 3. Cultural differences Section 2 THe changing of the guard 4. Changing the threat paradigm 5. The Changing Security Environment 6. The Changing Business Model 7. The Ever-Advancing Micro Chip 8. Leveraging Technology Section 3 The new world 9. Disruptive Technology a…

Edition
1st edition
ISBN/ISSN
9780750684255
Collation
xv, 215 hal.; ilus.; 23 cm
Series Title
--
Call Number
658.47 TYS s
Availability1
Add to basket
MARC DownloadCite
cover
Scene of the cybercrime
Comment Share
Cross, Michael

Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…

Edition
2nd Edition
ISBN/ISSN
9781597492768
Collation
iv, 732 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.8 CRO s
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and applied mathematics
Comment Share
Metcalf, LeighCasey, William

Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…

Edition
--
ISBN/ISSN
9780128044520
Collation
xi, 188 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.820151 MET c
Availability2
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?