Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 32 from your keywords: subject="Test"
First Page Previous 1 2 3 4 Next Last Page
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Professional penetration testing: creating and operating a formal hacking lab
Comment Share
Wilhelm, Thomas

Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…

Edition
1st edition
ISBN/ISSN
9781597494250
Collation
xix, 504 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 WIL p
Availability1
Add to basket
MARC DownloadCite
cover
Computer and information security handbook
Comment Share
Vacca, John R.

Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …

Edition
Second Edition
ISBN/ISSN
9780123943972
Collation
xxviii, 1171 hal.; ilus.; 29 cm
Series Title
--
Call Number
R005.8 VAC c
Availability1
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
Coding for penetration testers: building better tools
Comment Share
Andress, JasonLinn, Ryan

Table of Contents 1. Intro to Command Shell Scripting - Information in this Chapter - On Shell Scripting - UNIX, Linux, and OS X Shell Scripting - Bash Basics - Putting It All Together with Bash - Windows Scripting - PowerShell Basics - Putting it all together with PowerShell 2. Intro to Python - Information in this Chapter - What is Python? - W…

Edition
1st edition
ISBN/ISSN
9781597497299
Collation
xxiv, 295 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND c
Availability1
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
cover
The Basic of hacking and penetration testing: ethical hacking and penetration…
Comment Share
Enggebretson, Patrick

Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test

Edition
Second Edition
ISBN/ISSN
9780124116443
Collation
xviii, 204 hlm: ilus.; 23 cm
Series Title
--
Call Number
005.84 ENG b
Availability2
Add to basket
MARC DownloadCite
cover
Exploiting software: how to break code
Comment Share
Hoglund, GregMcGraw, Gary

Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits

Edition
--
ISBN/ISSN
9780201786958
Collation
xxii, 471 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 HOG e
Availability2
Add to basket
MARC DownloadCite
cover
Ethical hacking and penetration testing guide
Comment Share
Baloch, Rafay

Table of Contents: 1. Introduction to Hacking 2. Linux Basics 3. Information Gathering Techniques 4. Target Enumeration and Port Scanning Techniques 5. Vulnerability Assessment 6. Network Sniffing 7. Remote Exploitation 8. Client Side Exploitation 9. Post-Exploitation 10. Windows Exploit Development Basics 11. Wireless Hacking 12. Web Hacking

Edition
--
ISBN/ISSN
9781482231618
Collation
xxvii, 502 hal.; ilus.; 26 cm.
Series Title
--
Call Number
005.84 BAL e
Availability1
Add to basket
MARC DownloadCite
cover
Testing code security
Comment Share
Van der Linden, Maura A.

Contents: 1. Introduction 2. Security vocabulary 3. Software testing and changes in the security landscape 4. All trust is misplaced 5. Security testing considerations 6. Threat modeling and risk assessment processes 7. Personas and testing 8. Security test planning 9. Sample security considerations 10. Vulnerability case study : brute force browsing 11. Vulnerability case study : bu…

Edition
--
ISBN/ISSN
0849392519
Collation
xx, 303 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 VAN t
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?