Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 24 from your keywords: subject="Computer crimes -- In...
First Page Previous 1 2 3
cover
Digital forensics and incident response: a practical guide to deploying digit…
Comment Share
Johansen, Gerard

Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…

Edition
--
ISBN/ISSN
9781787288683
Collation
v, 308 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOH d
Availability1
Add to basket
MARC DownloadCite
cover
Virtualization and forensics: a digital forensic investigator's guide to virt…
Comment Share
Kipper, GregoryBarret, Diane

Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…

Edition
--
ISBN/ISSN
9781597495578
Collation
xvii, 253 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAR v
Availability1
Add to basket
MARC DownloadCite
cover
Network forensics: tracking hackers through cyberspace
Comment Share
Davidoff, SherriHam, Jonathan

Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…

Edition
--
ISBN/ISSN
9780132564717
Collation
xxvi, 545 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV n
Availability1
Add to basket
MARC DownloadCite
cover
Computer incident response and forensics team management: conducting a succes…
Comment Share
Jhonson III, Leighton R.

Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…

Edition
--
ISBN/ISSN
9781597499965
Collation
xiii, 333 hal.; ilus.; 24cm
Series Title
--
Call Number
658.4 JOH c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?