Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 1 2 3 4 5 Next Last Page
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1. Scope 2. Normative reference 3. Terms and definitions 4. Symbols and abbreviated terms 5. Structure 6. Overview 6.1 Background 6.2 Networks security planning 7. Identifying risk and preparing to identify security controls 7.1 Introduction 7.2 Information on current and/or planned networking 7.2.1 Security requirements in corporate information secu…

Edition
Second edition
ISBN/ISSN
-
Collation
viii, 48 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
Handbook jaringan komputer: teori dan praktik berbasiskan open source
Comment Share
I Putu Agus Eka Pratama

Daftar isi: Bab 1 Informasi buku, sistematika penulisan dan pendahuluan Bab 2 Mengenal jaringan komputer Bab 3 Application layer Bab 4 OTT (over the top) Bab 5 Peer to peer (P2P) Bab 6 Transport layer Bab 7 Network layer Bab 8 Data link layer Bab 9 Physical layer Bab 10 QoS (quality of service) Bab 11 Keamanan pada jaringan komputer Bab 12 Pelengkap praktik: perintah dasa…

Edition
Cetakan kedua
ISBN/ISSN
9786021514580
Collation
xxx, 762 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
R004.65 IPU h
Availability3
Add to basket
MARC DownloadCite
cover
Router cisco & mikrotik: IP routing menggunakan cisco dan mikroTik dalam teor…
Comment Share
Kukuh Nugroho

IP Routing merupakan sebuah konsep yang tidak bisa terlepas dari perangkat yang dinamakan router. Sebuah perangkat router minimal harus bisa melakukan fungsi IP Routing tersebut. Selain itu terdapat fungsi-fungsi lain yang harus disediakan oleh perangkat router seperti membuat firewall, mengatur bandwidth, atau membuat jaringan VPN (Virtual Private Network). Daftar Isi: Bab 1 Konsep routing…

Edition
Cet. I
ISBN/ISSN
9786026232090
Collation
viii, 230 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.65 KUK r
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Why? cyber crime: kejahatan dunia maya
Comment Share
Park, Sejun

Kejahatan dunia maya adalah perbuatan merugikan orang lain yang dilakukan melalui jaringan informasi dari peralatan yang dilengkapi dengan internet seperti komputer, ponsel, dan lain-lain. Terdapat berbagai macam jenis kejahatan yang dapat terjadi di dunia maya, mulai dari peretasan, pencemaran nama baik, pelanggaran hak cipta, komentar jahat, dan lain sebagainya. Kejahatan dunia maya harus dih…

Edition
Pertama
ISBN/ISSN
9786230013980
Collation
193 hlm.; ilus.; 25 cm
Series Title
--
Call Number
364.168 PAR w
Availability1
Add to basket
MARC DownloadCite
cover
Pengantar jaringan komputer pendekatan praktis untuk pemula
Comment Share
Agung Suprapto

Daftar isi: 1. Pengenalan jaringan 2. Klasifikasi jenis jaringan 3. Perangkat jaringan 4. Virtual LAN (VLAN) 5. OSI model dan TCP/IP model 6. Subneting 7. Media jaringan komputer 8. IP address dan mac address 9. IP routing 10. Network address translation (NAT) 11. Keamanan jaringan 12. Networking tool 13. Troubleshooting 14. Manajemen jaringan Daftar pustaka

Edition
-
ISBN/ISSN
9786230214431
Collation
xii, 119 hlm.; 23 cm
Series Title
-
Call Number
004.65 AGU p
Availability1
Add to basket
MARC DownloadCite
cover
Hyperconverged infrastucture data centers: demystifying HCI
Comment Share
Halabi, Sam

This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the context of a legacy data center design, detailing the problem statement for the particular technology a…

Edition
-
ISBN/ISSN
9781587145100
Collation
xxxii, 509 hlm.; illus.; 24 cm
Series Title
Cisco Press networking technology series
Call Number
004.68 HAL h
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Extrusion detection: security monitoring for internal intrusions
Comment Share
Bejtlich, Richard

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…

Edition
-
ISBN/ISSN
0321349962
Collation
xxviii, 385 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 BEJ e
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?