Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 64 from your keywords: subject="Software"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Reversing: secrets of reverse engineering
Comment Share
Eilam, Eldad

Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…

Edition
--
ISBN/ISSN
9780764574818
Collation
xxviii, 589 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 EIL r
Availability1
Add to basket
MARC DownloadCite
cover
The rootkit arsenal: escape and evasion in the dark corners of the system
Comment Share
Blunden, Bill

Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…

Edition
1st edition
ISBN/ISSN
9781598220612
Collation
xxvii, 908 hal.; ilus;; 23 cm
Series Title
--
Call Number
005.8 BLU r
Availability1
Add to basket
MARC DownloadCite
cover
Software architecture in practice
Comment Share
Bass, LenClements, PaulKazman, Rick

Table of contents: Part 1. Introduction 1. What is software architecture? 2. Why is software architecture important? 3. The many contexts of software architecture Part 2. Quality Attibuties 4. Understanding quality attributes 5. Availability 6. Interoperability 7. Modifiability 8. Performance …

Edition
Third Edition
ISBN/ISSN
9780321815736
Collation
xix, 589 hal.; ilus.; 25 cm
Series Title
SEI series in software engineering
Call Number
005.1 BAS s
Availability1
Add to basket
MARC DownloadCite
cover
Malware: fighting malicious code
Comment Share
Skoudis, EdZeltser, Lenny

Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion

Edition
1st edition
ISBN/ISSN
9780131014053
Collation
xxii, 647 hal.; ilus.; 23 cm
Series Title
Prentice Hall series in computer networking and distributed systems
Call Number
005.84 SKO m
Availability1
Add to basket
MARC DownloadCite
cover
Hacking and securing iOS applications
Comment Share
Zdziarski, Jonathan A.Oram, AndrewRomano, Robert

Table of Contents Chapter 1 Everything You Know Is Wrong The Myth of a Monoculture The iOS Security Model Storing the Key with the Lock Passcodes Equate to Weak Security Forensic Data Trumps Encryption External Data Is at Risk, Too Hijacking Traffic Trust No One, Not Even Your Application Physical Access Is …

Edition
1st edition
ISBN/ISSN
9781449318741
Collation
xv, 336 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.265 ZDZ h
Availability1
Add to basket
MARC DownloadCite
cover
The art of computer virus research and defense
Comment Share
Szor, Peter

Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …

Edition
--
ISBN/ISSN
0321304543
Collation
xxvii, 713 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 SZO a
Availability1
Add to basket
MARC DownloadCite
cover
Malware, rootkits & botnets: a beginner's guide
Comment Share
Elisan, Christopher C.

Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …

Edition
--
ISBN/ISSN
9780071792066
Collation
xxvi, 353 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 ELI m
Availability1
Add to basket
MARC DownloadCite
cover
Rekayasa perangkat lunak: pendekatan praktisi (buku I)
Comment Share
Roger S. Pressman

Daftar isi: BAB 1 Produk BAB 2 Proses BAB 3 Konsep manajemen proyek BAB 4 Proses perangkat lunak dan metrik proyek BAB 5 Perencanaan proyek perangkat lunak BAB 6 Manajemen risiko BAB 7 Penjadwalan dan penelusuran proyek BAB 8 Jaminan kualitas perangkat lunak BAB 9 Manajemen konfigurasi perangkat lunak BAB 10 Rekayasa sistem BAB 11 Konsep dan prinsip analisis BAB 12 Pemode…

Edition
Ed. I
ISBN/ISSN
9795338080
Collation
xvi, 647 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.36 PRE r
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?