Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 156 from your keywords: subject="security measures"
First Page Previous 1 2 3 4 5 Next Last Page
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
cover
Extrusion detection: security monitoring for internal intrusions
Comment Share
Bejtlich, Richard

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…

Edition
-
ISBN/ISSN
0321349962
Collation
xxviii, 385 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 BEJ e
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
The manga guide to cryptography
Comment Share
Masaaki MitaniShinichi SatoIdero Hinoki

Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…

Edition
-
ISBN/ISSN
9781593277420
Collation
xi, 233 hlm.; ill.: 24 cm.
Series Title
-
Call Number
652.8 MAS m
Availability1
Add to basket
MARC DownloadCite
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
CCSP Certified Cloud Security Professional official practice tests: an ISC2 c…
Comment Share
Malisow, Ben

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by d…

Edition
Second Edition
ISBN/ISSN
9781119603498
Collation
xxv, 373 hlm; 23 cm
Series Title
-
Call Number
004.6782 MAL c
Availability1
Add to basket
MARC DownloadCite
cover
IPv6 security
Comment Share
Hogg, ScottVyncke, Eric

Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…

Edition
--
ISBN/ISSN
9781587055942
Collation
xxi, 540 hal.; ilus.; 23 cm
Series Title
Cisco Press networking technology series
Call Number
005.8 HOG i
Availability1
Add to basket
MARC DownloadCite
cover
Risk analysis and the security survey
Comment Share
Broder, James F.Dwi Prabantini

Termasuk bibliografi dan indeks. CONTENTS:
1. Risk
2. Vulnerability and Threat Identification
3. Risk Measurement
4. Quantifying and Prioritizing Loss Potential
5. Cost/Benefit Analysis
6. Other Risk Analysis Methodologies
7. The Security Survey
8. Management Audit Techniques and the Preliminary Survey
9. The Survey Report
10. Crime…

Edition
Third Edition
ISBN/ISSN
9780750679220
Collation
xviii, 371 hlm.; ilus.; 26 cm.
Series Title
null
Call Number
658.401 BRO r
Availability3
Add to basket
MARC DownloadCite
cover
Applied cyber security and the smart grid: implementing security controls int…
Comment Share
Knapp, Eric DSamani, RajLangill, Joel

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …

Edition
--
ISBN/ISSN
9781597499989
Collation
xxii, 202 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.310285 KNA a
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?