Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 26 27 28 29 30 Next Last Page
cover
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Comment Share
Sood, Aditya KEnbody, Richard J

Table of Contents A Few Words About Targeted Cyber Attacks Acknowledgments About the Authors Overview Chapter 1. Introduction References Chapter 2. Intelligence Gathering 2.1 Intelligence Gathering Process 2.2 OSINT, CYBINT, and HUMINT 2.3 OSNs: A Case Study References Chapter 3. Infecting the Target 3.1 …

Edition
1st edition
ISBN/ISSN
9780128006047
Collation
xv, 142 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 SOO t
Availability1
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
cover
Cyber warfare: techniques, tactics and tools for security practitioners
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Acknowledgments Foreword Why a Book on Cyber Warfare Is Important Why Should You Read This Book Introduction Abstract Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion Chapter 1. What is Cyber Warfare? Abstract Information in This Chapter What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Import…

Edition
Second Edition
ISBN/ISSN
9780124166721
Collation
xi, 306 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 AND c
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber warfare: understanding the fundamentals of cyber warfare …
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…

Edition
1st edition
ISBN/ISSN
9780124047372
Collation
x, 150 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 WIN b
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cyber-warfare: a multidisciplinary approach
Comment Share
Shakarian, PauloShakarian, JanaRuef, Andrew

Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…

Edition
1st edition
ISBN/ISSN
9780124078147
Collation
xvii, 318 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 SHA i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and IT infrastructure protection
Comment Share
Vacca, John

Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…

Edition
--
ISBN/ISSN
9780124166813
Collation
xxiv, 356 hal.;ilus.; 24 cm
Series Title
--
Call Number
005.8 VAC c
Availability2
Add to basket
MARC DownloadCite
cover
Web application vulnerabilities: detect, exploit, prevent
Comment Share
Cross, MichaelKapinos, StevenMeer, HaroonMuttik, IgorPalmer, Steve

Chapter 1: Introduction to web application hacking Introduction Web application architecture components Complex web application software components Putting it all together The web application hacking methodology The history of web application hacking and the evolution of tools Chapter 2: Information Gathering Techniques Introduction The principles of automating searches Ap…

Edition
1st edition
ISBN/ISSN
9781597492096
Collation
xv, 460 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.8 CRO w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber reconnaissance, surveillance, and defense
Comment Share
Shimonski, Robert

Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…

Edition
1st edition
ISBN/ISSN
9780128013083
Collation
xv, 241 hal.; ilus.; 24 cm
Series Title
--
Call Number
327.12 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber guerilla
Comment Share
Van Haaster, JelleGevers, RickeySprengers, Martijn

Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…

Edition
1st edition
ISBN/ISSN
9780128051979
Collation
xiv, 128 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 HAA c
Availability1
Add to basket
MARC DownloadCite
cover
OS X exploits and defense: own it... just like windows or Linux!
Comment Share
Baccas, PaulFinisterre, KevinHarley, David

Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…

Edition
1st edition
ISBN/ISSN
9781597492546
Collation
viii, 333 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAC o
Availability1
Add to basket
MARC DownloadCite
First Page Previous 26 27 28 29 30 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?