Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 716 from your keywords: subject="--"
First Page Previous 1 2 3 4 5 Next Last Page
cover
ISO/IEC 27005 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…

Edition
Third edition
ISBN/ISSN
--
Collation
vi, 53 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27000 -- Information technology -- security techniques -- Information…
Comment Share
ISO/IEC

Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …

Edition
Fifth edition
ISBN/ISSN
--
Collation
v, 27 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents: Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 7.1 General 7.2 Unauthorized access 7.3 Packet sniffing 7.4 Rogue wireless access point 7.5 Denial of service attack 7.6 Bluejacking 7.7 Bluesnarfing 7.8 Adhoc networks 7.9 Other threats 8 Security requirements 8…

Edition
First edition
ISBN/ISSN
--
Collation
vii, 26 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27002 -- Information technology -- security techniques -- code of pra…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…

Edition
Second edition
ISBN/ISSN
--
Collation
vii, 80 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Page Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Internet access services for employees 7.1 Background 7.2 Security threats 7.3 Security design techniques and controls 8 Business to business services 8.1 Background 8.2 Security threats 8.3 Security design techniques and controls 9 Business to customer s…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 30 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 9 Security controls 9.1 Overview 9.2 Stateless packet filtering 9.3 Stateful packet inspection 9.4 Application firewall 9.5 Content filtering 9.6 Intrusion prevention system and intrusion detection system 9.7 Security m…

Edition
First edition
ISBN/ISSN
--
Collation
v, 22 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents : Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 6.1 Introduction 6.2 Types of VPNs 7 Security Threats 8 Security Requirements 8.1 Overview 8.2 Confidentiality 8.3 Integrity 8.4 Authenticity 8.5 Authorization 8.6 Availability 8.7 Tunnel Endpoint Security 9 Security Controls 9.1 Securit…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 14 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27004 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography

Edition
Second edition
ISBN/ISSN
--
Collation
v, 58 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27003 -- Information technology -- security techniques -- information…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 5 Leadership 6 Planning 7 Support 8 Operation 9 Performance evaluation 10 Improvement Annex A (informative) policy framework Bibliography

Edition
Second edition
ISBN/ISSN
--
Collation
vi, 45 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Preparing for design of network security 6.1 Introduction 6.2 Asset identification 6.3 Requirements collection 6.3.1 Legal and regulatory requirements 6.3.2 Business requirements 6.3.3 Performance requirements 6.4 Review requirements 6.5 Review of existing designs and i…

Edition
First edition corrected version
ISBN/ISSN
--
Collation
v, 28 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?