Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 33 from your keywords: subject="hacker"
First Page Previous 1 2 3 4 Next Last Page
cover
Security jaringan komputer berbasis CEH
Comment Share
Rifkie Primartha

Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…

Edition
--
ISBN/ISSN
9786026232571
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.84 RIF s
Availability3
Add to basket
MARC DownloadCite
cover
Phishing: cara mudah menyadap password dan pencegahannya
Comment Share
Efvy Zam

DAFTAR ISI Bab 1. Pendahuluan Gambaran teknik phishing Mengapa phishing bisa terjadi? Bab 2. Web clonning Bab 3. Script penyadap password Password dalam file teks Password dikirim ke email Bab 4. Trik memilih hosting gratis Bab 5. Belajar upload file Web based upload Filezilla Bab 6. Studi kasus phishing Facebook Step 1. Web clonning Step 2. Domain manipulation Step 3…

Edition
--
ISBN/ISSN
9797944522
Collation
vii, 167 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 EFV p
Availability0
Add to basket
MARC DownloadCite
cover
CEH certified ethical hacker all-in-one exam guide
Comment Share
Walker, Matt

CONTENTS: Chapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Hacking Through the Network: Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Low Tech: Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applica…

Edition
--
ISBN/ISSN
9780071772297
Collation
xxii, 391 hlm.: ilus.; 24 cm.
Series Title
--
Call Number
005.84 WAL c
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 100 % illegal
Comment Share
S'to

Daftar isi: Module 1. Pemahaman dasar ethical hacker Kenapa keamanan computer menjadi penting Terminologi-terminologi dasar Element-element keamanan Tahapan aktifitas hacking Pengelompokan jenis serangan Hacktivistm Ethical hacking atau hacking beretika Vulnerability research dan tools Bagaimana ethical hacker bekerja Jenis testing Metodologi testing Module 2. Footprinting Men…

Edition
Cetakan kedua
ISBN/ISSN
9789791090216
Collation
viii, 200 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 200 % illegal
Comment Share
S'to

Daftar isi: MODULE 6: ENUMERATION BAB 1 Enumeration Enumeration Null sessions Enumerasi active directory MODULE 7: SYSTEM HACKING BAB 2 Password cracking Active online attacks Passive online attacks Offline attacks Non electronic attacks BAB 3 Escalating privileges BAB 4 Executing application, keylogger & spyware Executing appli…

Edition
Cetakan kedua
ISBN/ISSN
9789791090278
Collation
vi, 202 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c2
Availability0
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 400% illegal
Comment Share
S'to

Daftar isi: Module 10. Sniffer BAB 1. Sniffer, si tukang intip Ethernet dan topologi jaringan CSMA/CD Hub Switch Brosur switch Enkapsulasi dan dekapsulasi Type sniffing Protokol yang bermasalah Network viever tools Passive sniffing Active sniffing BAB 2. DNS poisoning techniques Intranet DNS spoofing Internet DNS spoofing Proxy server DNS poisoning DNS cache Poisoning B…

Edition
Cetakan pertama
ISBN/ISSN
9789791090452
Collation
viii, 188 hlm.; ILUS.; 21 cm
Series Title
--
Call Number
005.84 STO c4
Availability1
Add to basket
MARC DownloadCite
cover
Exploiting software: how to break code
Comment Share
Hoglund, GregMcGraw, Gary

Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits

Edition
--
ISBN/ISSN
9780201786958
Collation
xxii, 471 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 HOG e
Availability2
Add to basket
MARC DownloadCite
cover
Masuki dunia hacker dengan C++
Comment Share
Ardi Nursyamsu

Daftar isi: Bagian 1 BAB 1 MASUKI DUNIA C++ Bahasa c Berkenalan dengan compiler C++ Berkenalan dengan compiler Menginstal dev-c++ Menulis source code Analisis struktur code Sedikit tentang C++ standard library BAB 2 OPRASI MATEMATIKA Pernyataan matematika dalam C++ Variabel Konstanta Teori bilangan Operator Operator assignment (pemberian nilai) Operator artimatika …

Edition
--
ISBN/ISSN
9789791090476
Collation
x, 278 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 ARD m
Availability1
Add to basket
MARC DownloadCite
cover
Black hacker vs white hacker
Comment Share
Akbar Kaelola

Daftar Isi: Membongkar Hacker! PARA PEMBOBOL Kevin mitnick, George hotz, Ray abduh, Dani firmansyah PARA PENCETUS Tim benners-Lee, Linux torvald, Fiyodor, Moris, Stalman, HACKER SUPER KAYA Bill gates & paul allen, Jobes & Wazniak, Larry & sergey, HACKER LOKAL TAK KURANG AKAL I made Wiryana SUMBER PUSTAKA

Edition
Cetakan pertama
ISBN/ISSN
9789798770937
Collation
128 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.1092 AKB b
Availability1
Add to basket
MARC DownloadCite
cover
Hacker, hoaxer, whistleblower, SPY: the many faces of anonymous
Comment Share
Coleman, Gabriella

Table of contents: 1.On Trolls, Tricksters, and the Lulz 2.Project Chanology -I Came for the Lulz but Stayed for the Outrage 3.Weapons of the Geek 4.The Shot Heard Round the World 5.Anonymous Everywhere 6.“r;Moralfaggotry”r; Everywhere 7.Revenge of the Lulz 8.LulzSec 9.AntiSec 10.The Desire of a Secret Is to Be Told 11.The Sabutage

Edition
--
ISBN/ISSN
9781781689837
Collation
482 hal.; ilus.; 21 cm
Series Title
--
Call Number
364.168 COL h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?