Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 46 from your keywords: subject="Hacking"
First Page Previous 1 2 3 4 5 Last Page
cover
Programming with 64-Bit ARM Assembly Language: Single Board Computer Developm…
Comment Share
Smith, Stephen

Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of…

Edition
-
ISBN/ISSN
9781484258804
Collation
xxv, 428 hlm; 23 cm
Series Title
-
Call Number
005.2 SMI p
Availability1
Add to basket
MARC DownloadCite
cover
Hacking via smartphone dengan Kali NetHunter
Comment Share
Yosef MuryaAgung NugrohoGregorius Mikael

Daftar isi 1. Operating system mobile Android 2. Kali NetHunter 3. Single boot NetHunter pada smartphone 4. Dual boot NetHunter pada smartphone 5. Instalasi manual Kali Chroot NetHunter 6. Packet capture monitoring mode 7. Hacking password wifi 8. DOS wireless access point 9. Remote access

Edition
-
ISBN/ISSN
9786027117730
Collation
viii, 138 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 YOS h
Availability1
Add to basket
MARC DownloadCite
cover
Hacking exposed computer forensics: secrets & solutions
Comment Share
Philipp, AaronCowen, DavidDavis, Chris

Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…

Edition
Second edition
ISBN/ISSN
9780071626774
Collation
xxiv, 518 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 PHI h
Availability1
Add to basket
MARC DownloadCite
cover
Kali Linux top hacking
Comment Share
Rudy Samuel Pardosi

Daftar isi: BAB 1 Shellshock attack Pencegahan yang dapat dilakukan Test shellshock Testing server BAB 2 Heartbleed attack Ilustrasi Test server BAB 3 Man in the middle attack (MITM) Apakah MITM? Teknik man in the middle Serangan MITM Serangan SSL-MITM HTTPS vs HTTP (trusted vs untrusted) HTTP adalah gerbang untuk menuju HTTPS Menyerang HTTP, bukan HTTPS Cara mencegah MITM…

Edition
Pertama
ISBN/ISSN
9786020823010
Collation
viii, 169 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 RUD k
Availability1
Add to basket
MARC DownloadCite
cover
Wireless hacking
Comment Share
Efvy Zamidra Zam

Daftar isi: BAB 1 Sekilas jaringan wireless BAB 2 Persiapan perang BAB 3 War driving BAB 4 Hidden SSID BAB 5 Disconnect komputer target BAB 6 Denial of service (DoS) BAB 7 Crack wep keys BAB 8 Crack WPA/WPA2 keys BAB 9 Melacak password tersembunyi BAB 10 MAC address filtering BAB 11 Melihat daftar klien access point BAB 12 Menyusup ke komputer lain BAB 13 Mengintip webs…

Edition
Edisi revisi
ISBN/ISSN
9786020236476
Collation
x, 226 hal.; ilus.; 21 cm.; 1 + CD
Series Title
--
Call Number
005.84 EFV w
Availability3
Add to basket
MARC DownloadCite
cover
The web application hacker’s handbook: finding and exploiting security flaws
Comment Share
Stuttard, DafyddPinto, Marcus

Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…

Edition
Second Edition
ISBN/ISSN
9781118026472
Collation
xxxiii, 878 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 STU w
Availability3
Add to basket
MARC DownloadCite
cover
Kali Linux: 300% attack
Comment Share
Fachrizal Oktavian

Daftar isi: Chapter I Backtrack, kali linux, and ethical hacking Chapter II Using virtual machine Chapter III Connecting to a network Chapter IV Wireless TX power Chapter V Uncovering hidden SSID of wireless access point Chapter VI Bypassing MAC filters on AP Chapter VII Breaking WPA2 wireless Chapter VIII Rogue wireless access point and evil twins Chapter IX …

Edition
--
ISBN/ISSN
9786020823027
Collation
xiii, 217 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 FAC k
Availability2
Add to basket
MARC DownloadCite
cover
Buku pintar teknik hacking
Comment Share
Dedik KurniawanJava Creativity

Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip …

Edition
Pertama
ISBN/ISSN
9786020219370
Collation
xi, 264 hlm.; ilus.; 21 cm + 1 DVD
Series Title
--
Call Number
005.84 DED b
Availability2
Add to basket
MARC DownloadCite
cover
Trik bobol jaringan wireless
Comment Share
Asimov, IsaacKingsolver, BarbaraMunadzir MF

Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filt…

Edition
null
ISBN/ISSN
9786022881575
Collation
212 hlm.; ilus.; 21 cm.
Series Title
null
Call Number
005.84 MUN t
Availability1
Add to basket
MARC DownloadCite
cover
Hacking for dummies
Comment Share
Beaver, Kevin

Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…

Edition
6th Edition
ISBN/ISSN
9781119485476
Collation
xiv, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 BEA h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?