Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1059 from your keywords: subject="Na"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Tallinn manual 2.0 on the international law applicable to cyber operations
Comment Share
Schmitt, Michael N.

Terdapat bibliografi dan indeks. Table of contents: Pt. I General international law and cyberspace 1.Sovereignty 2.Due diligence 3.Jurisdiction 4.Law of international responsibility 5.Cyber operations not per se regulated by international law Pt. II Specialised regimes of international law and cyberspace 6.International human rights law 7.Diplomatic and consular law 8.Law of the …

Edition
Second edition
ISBN/ISSN
9781316630372
Collation
xli, 598 hal.; ilus.; 24 cm
Series Title
--
Call Number
341.6 SCH t
Availability2
Add to basket
MARC DownloadCite
cover
Data analysis with open source tools
Comment Share
Janert, Philipp K.

Terdapat indeks. Table of Contents: Chapter 1 Introduction Chapter 2 A Single Variable: Shape and Distribution Chapter 3 Two Variables: Establishing Relationships Chapter 4 Time As a Variable: Time-Series Analysis Chapter 5 More Than Two Variables: Graphical Multivariate Analysis Chapter 6 Intermezzo: A Data Analysis Session Chapter 7 Guesstimation and the Back of the Envelope Chapte…

Edition
First edition
ISBN/ISSN
9780596802356
Collation
xviii, 509 hal.; ilus.; 24 cm
Series Title
--
Call Number
006.312 JAN d
Availability1
Add to basket
MARC DownloadCite
cover
Inside network perimeter security
Comment Share
Northcutt, StephenZeltser, LennyWinters, ScottKent, KarenRitchey, Ronald W.

Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…

Edition
Second edition
ISBN/ISSN
0672327376
Collation
xxxii, 734 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR i
Availability2
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
The basics of hacking and penetration testing: ethical hacking and penetratio…
Comment Share
Engebretson, Patrick

Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test

Edition
1st edition
ISBN/ISSN
9781597496551
Collation
xvii, 159 hal.; ilus.; 24 cm
Series Title
Syngress the basics
Call Number
005.84 ENG b
Availability1
Add to basket
MARC DownloadCite
cover
The hacker's guide to OS X: exploiting OS X from the root up
Comment Share
Bathurst, RobertRogers, RussGhassemlouei, Alijohn

Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…

Edition
1st edition
ISBN/ISSN
9781597499507
Collation
x, 235 hal.; illus.; 24 cm
Series Title
--
Call Number
005.84 BAT h
Availability1
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
CERT resilience management model: a maturity model for managing operational r…
Comment Share
Caralli, Richard A.Allen, Julia H.White, David W.

pt. ONE ABOUT THE CERT RESILIENCE MANAGEMENT MODEL 1.Introduction 1.1.The Influence of Process Improvement and Capability Maturity Models 1.2.The Evolution of CERT-RMM 1.3.CERT-RMM and CMMI Models 1.4.Why CERT-RMM is not a Capability Maturity Model 2.Understanding Key Concepts in CERT-RMM 2.1.Foundational Concepts 2.1.1.Disruption and Stress 2.1.2.Convergence 2.1.3.Managing Operatio…

Edition
--
ISBN/ISSN
9780321712431
Collation
xxiv, 1029 hal.; ilus.; 24 cm
Series Title
SEI series in software engineering
Call Number
658.47 CAR c
Availability1
Add to basket
MARC DownloadCite
cover
Oracle PL/SQL programming
Comment Share
Feuerstein, StevenPribyl, Bill

Terdapat bibliografi dan indeks. Table of Contents Part I Programming in PL/SQL Chapter 1 Introduction to PL/SQL What Is PL/SQL? The Origins of PL/SQL So This Is PL/SQL About PL/SQL Versions Resources for PL/SQL Developers Some Words of Advice Chapter 2 Creating and Running PL/SQL Code Navigating the Database Creating and Editing Source Code SQL*Plus Performi…

Edition
Fifth edition
ISBN/ISSN
9780596514464
Collation
xxxviii, 1186 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 FEU o
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?