Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 33 from your keywords: subject="Cyber security"
First Page Previous 1 2 3 4 Next Last Page
cover
Cyber security at Huawei: public affairs and communications department
Comment Share
Zhengfei, Ren

We are heading into in a world everything is connected, everything is sensing, and everything is intelligent.

Edition
-
ISBN/ISSN
-
Collation
166 hlm.; 28 cm
Series Title
-
Call Number
005.8 ZHE c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber analogies
Comment Share
Goldman, Emily OArquilla, John

This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the visual domain and determine the policies that govern it,

Edition
-
ISBN/ISSN
9781521409855
Collation
189 hlm.; 25 cm
Series Title
-
Call Number
005.8 GOL c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity ??? attack and defense strategies: infrastructure security with…
Comment Share
Diogenes, YuriOzkaya Erdal

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in y…

Edition
First
ISBN/ISSN
9781788475297
Collation
viii, 367 hlm; 23 cm
Series Title
-
Call Number
005.8 DIO c
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi NIST Cyber Security Framework (CSF) dan Center for Internet Secu…
Comment Share
Obrina Candra BriliyantIra Rosianal HikmahTiyas YulitaMelandy Andriawan

Pertumbuhan pengguna teknologi yang semakin meningkat setap tahunnya di Indonesia, turut mendorong pemanfaat ruang siber. Ruang siber menjadi pilihan saat ini dikarenakan kemudahan yang ada pada fleksibilitas medianya. Selain digunakan masyarakat secara umum, ruang siber juga digunakan dalam berbagai sektor vital di indonesia, atau lebih dikenal sebagai Infrastruktur Informasi Vital Nasional (I…

Edition
--
ISBN/ISSN
--
Collation
xiv, 46 hlm.
Series Title
-
Call Number
2022 MEL i
Availability2
Add to basket
MARC DownloadCite
cover
Perancangan kriteria cyber security audit pada layanan kesehatan menggunakan …
Comment Share
Nanang TriantoRahmat PurwokoIra Rosianal HikmahGalang Putra Nusantara

Pemanfaatan Teknologi Informasi dan Komunikasi (TIK) yang semakin meningkat diberbagai sektor memunculkan risiko keamanan yang semakin besar. Terdapat beberapa sektor yang menggunakan teknologi informasi untuk membantu, menyimpan, dan mengelola informasi. Institusi pemerintah menggunakan teknologi informasi untuk memberikan layanan publik. Sektor kesehatan adalah salah satu dari berbagai sektor…

Edition
--
ISBN/ISSN
--
Collation
xiv, 70 hlm.
Series Title
-
Call Number
2022 GAL p
Availability2
Add to basket
MARC DownloadCite
cover
We have root: even more advice from schneier on security
Comment Share
Schneier, Bruce

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to…

Edition
-
ISBN/ISSN
9781119643012
Collation
xiii, 304 hlm; 23 cm
Series Title
-
Call Number
005.8 SCH w
Availability1
Add to basket
MARC DownloadCite
cover
Cyberjutsu: cybersecurity for the modern ninja
Comment Share
McCarty, Ben

Table of Contents Chapter 1: Mapping Networks Chapter 2: Guarding with Special Care Chapter 3: Xenophobic Security Chapter 4: Identification Challenges Chapter 5: Double-Sealed Password Chapter 6: Hours of Infiltration Chapter 7: Access to Time Chapter 8: Tools Chapter 9: S

Edition
-
ISBN/ISSN
9781718500549
Collation
xxvii, 231 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 MCC c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber defence in the age of AI, smart societies and augmented humanity (Adva…
Comment Share
Jahankhani, HamidKendzierskyj, StefanChelvachandran, NishanIbarra, Jaime

This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies.…

Edition
-
ISBN/ISSN
9783030357450
Collation
viii, 450 hlm.; ilus.; 24 cm
Series Title
Advanced Sciences and Technologies for Security Applications
Call Number
005.8 JAH c
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and decision makers: data security and digital trust
Comment Share
Fréminville, Marie De

Contents 1. An Increasingly Vulnerable World 1.1. The context 1.1.1. Technological disruptions and globalization 1.1.2. Data at the heart of industrial productivity 1.1.3. Cyberspace, an area without boundaries 1.1.4. IT resources 1.2. Cybercrime 1.2.1. The concept of cybercrime 1.2.2. Five types of threats 1.2.3. Five types of attackers 1.3. The cybersecurity market 1.3.1. The si…

Edition
-
ISBN/ISSN
9781786305190
Collation
xxi, 186 hlm.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
005.8 FRE c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?