Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 159 from your keywords: subject="security measures"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Management of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…

Edition
Fifth Edition
ISBN/ISSN
9781305501256
Collation
xxii, 650 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WHI m
Availability1
Add to basket
MARC DownloadCite
cover
Wireless communications under hostile jamming: security and efficiency
Comment Share
Li, TongtongSong, TianlongLiang, Yuan

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. Table of contents Part I Wireless Technology and Communications—Explorat…

Edition
-
ISBN/ISSN
9789811308208
Collation
xxi, 219 hlm; 23,5 cm
Series Title
--
Call Number
004.66 LI w
Availability2
Add to basket
MARC DownloadCite
cover
Data security in cloud storage (wireless networks)
Comment Share
Zhang, YuanXu, ChunxiangShen, Xuemin Sherman

Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D

Edition
-
ISBN/ISSN
9789811543739
Collation
xii, 171 hlm.; ilus.; 24 cm
Series Title
-
Call Number
004.6782 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
cover
Extrusion detection: security monitoring for internal intrusions
Comment Share
Bejtlich, Richard

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…

Edition
-
ISBN/ISSN
0321349962
Collation
xxviii, 385 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 BEJ e
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
The manga guide to cryptography
Comment Share
Masaaki MitaniShinichi SatoIdero Hinoki

Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…

Edition
-
ISBN/ISSN
9781593277420
Collation
xi, 233 hlm.; ill.: 24 cm.
Series Title
-
Call Number
652.8 MAS m
Availability1
Add to basket
MARC DownloadCite
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
CCSP Certified Cloud Security Professional official practice tests: an ISC2 c…
Comment Share
Malisow, Ben

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by d…

Edition
Second Edition
ISBN/ISSN
9781119603498
Collation
xxv, 373 hlm; 23 cm
Series Title
-
Call Number
004.6782 MAL c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?