Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 54 from your keywords: subject="Komputer -- Pengamana...
First Page Previous 1 2 3 4 5 Next Last Page
cover
The Basic of hacking and penetration testing: ethical hacking and penetration…
Comment Share
Enggebretson, Patrick

Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test

Edition
Second Edition
ISBN/ISSN
9780124116443
Collation
xviii, 204 hlm: ilus.; 23 cm
Series Title
--
Call Number
005.84 ENG b
Availability2
Add to basket
MARC DownloadCite
cover
The cybersecurity to English dictionary
Comment Share
Meeuwisse, Raef

Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…

Edition
Third edition
ISBN/ISSN
9781911452102
Collation
xii, 106 hal.; 20 cm
Series Title
--
Call Number
R005.803 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
Hacking for dummies
Comment Share
Beaver, Kevin

Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…

Edition
6th Edition
ISBN/ISSN
9781119485476
Collation
xiv, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 BEA h
Availability1
Add to basket
MARC DownloadCite
cover
Anti privacy: melacak, membajak, & memobol data rahasia
Comment Share
Efvy ZamSudarma S

Daftar isi Bab 1 Melacak file tersembunyi File hidden Memeriksa file tersembunyi File super hidden Memburu file tersembunyi Bab 2 Mengatasi folder yang terkunci Membuka folder terlarang Membuka folder yang diproteksi aplikasi Bab 3 Mengendus CACLS & data streams Mengatasi CACLS Mendeteksi data streams Bab 4 Ngepet file Menyedot sisi flashdisk Membajak data CD-ROM …

Edition
--
ISBN/ISSN
9797944239
Collation
viii, 192 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 EFV a
Availability1
Add to basket
MARC DownloadCite
cover
Security for web services and service-oriented architectures
Comment Share
Bertino, ElisaMartino, LorenzoPaci, FedericaSquicciarini, Anna

Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends

Edition
--
ISBN/ISSN
9783540877417
Collation
xii, 226 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BER s
Availability1
Add to basket
MARC DownloadCite
cover
Fundamental of PHP security
Comment Share
Wiwit Siswoutomo

Daftar isi: Bab 1 Validasi input 1.1 Validasi angka 1.2 Validasi string 1.3 Input yang membingungkan 1.4 Problema file Bab 2 Cross-site scripting 2.1 Enconding solution 2.2 Menangani atribut 2.3 Mengakali filter 2.4 Strip-tags () 2.5 Environtmen variables Bab 3 SQL injection 3.1 Magic quates 3.2 Ketepatan tipe data 3.3 Penyerangan like 3.4 SQL error handling 3.5 File inc…

Edition
Pertama
ISBN/ISSN
9789792705270
Collation
vii, 207 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 WIW f
Availability1
Add to basket
MARC DownloadCite
cover
Kumpulan tool proteksi PC dan jaringan
Comment Share
Oktaviani Hastu Sudiyarto

Daftar isi: Bab I Aplikasi Antivirus Bab II Aplikasi Imaging System Bab III Aplikasi File Recovery Bab IV Aplikasi Dekstop Locker Bab V Aplikasi Perawatan Sistem Bab VI Aplikasi proteksi folder Bab VII Aplikasi Pop up blocker Bab VIII Aplikasi firewall Bab IX Aplikasi

Edition
Ed. I
ISBN/ISSN
9797630641
Collation
x, 258 hlm.; ilus.; 23 cm
Series Title
Seri Populer
Call Number
005.8 OKT k
Availability1
Add to basket
MARC DownloadCite
cover
Advances in security technology: International conference, SecTech 2008, and …
Comment Share
Kim, Haeng-konKim, Tai-hoonKiumi, Akingbehin

Contents: Security analysis of a novel elliptic curve dynamic access control system VoIP SPAM response system adopting multi-leveled anti-SPIT solutions Feature extraction for IRIS recognition Bidirectional quantum secure direct communication based on entanglement Study and implementation of selinux-like access control mechanism based on linux Research on streaming dta integration syste…

Edition
--
ISBN/ISSN
9783642102394
Collation
xii, 161 hlm.; ilus.; 24 cm
Series Title
Communications in Computer and Information Science
Call Number
R005.8 KIM a
Availability1
Add to basket
MARC DownloadCite
cover
Pengamanan server menggunakan SMS
Comment Share
Aidil ChendramataAdhityo Priyambodo

Daftar isi: 1. Pendahuluan 2. Skema Sistem Notifikasi 3. Pemasangan 3.1 Kebutuhan Pemasangan 3.2 Pemasangan Melalui Kode Sumber 3.3 Pemasangan Melalui Repositori 4. Konfigurasi Kannel 5. Memulai kannel 5.1 Memulai Kannel Ala Debian 5.2 Memulai Kannel Kode Sumber 6. Uji Penggunaan Kannel 7. Membuat Ping Sederhana Sebagai Contoh Kasus 8. Membuat Pemonitoran Sederhana Dengan SNMP …

Edition
Cetakan pertama
ISBN/ISSN
--
Collation
viii, 68 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?