Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 31 32 33 34 35 Next Last Page
cover
Manajemen proyek
Comment Share
E. JasjfiLock, Dennis

Edition
Ketiga
ISBN/ISSN
54100532
Collation
x, 355 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
658.404 LOC m

Edition
Ketiga
ISBN/ISSN
54100532
Collation
x, 355 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
658.404 LOC m
Availability1
Add to basket
MARC DownloadCite
cover
PMP exam prep: rapid learning to pass PMI's PMP exam-- on your first try!
Comment Share
Mulcahy, Rita

Are you looking for a time-tested and proven study guide for the PMP exam? This new edition of Rita Mulcahy's worldwide best-selling PMP exam preparation book is aligned with the PMBOK Guide—Fourth Edition 2008 (the brown one) and is specifically written for people who plan to sit for the PMP®examination after June 30th of 2009. Features of this worldwide best-selling resource include the fo…

Edition
-
ISBN/ISSN
9781932735185
Collation
viii, 535 hlm.; 28 cm.
Series Title
-
Call Number
658.404 MUL p
Availability1
Add to basket
MARC DownloadCite
cover
The Security risk assessment handbook: a complete guide for performing securi…
Comment Share
Landoll, Douglas J.

"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional developme…

Edition
Second Edition
ISBN/ISSN
9781439821480
Collation
xix, 475 hlm.; ilus.; 24 cm
Series Title
--
Call Number
658.47 LAN s
Availability4
Add to basket
MARC DownloadCite
cover
Teknik riset pemasaran dan ramalan penjualan
Comment Share
J. Supranto

Isi ringkas buku ini adalah: Bab I. Pentingnya Apresiasi Riset Pemasaran Bagi Pimpinan Perusahaan Bab II. Hal-Hal Yang Perlu Diperhatikan Di Dalam Riset Pemasaran Bab III. Sumber Dan Metode Pengumpulan Data Bab IV. Pelaksanaan Riset Pemasaran Bab V. Contoh-Contoh Riset Pemasaran Bab VI. Meramalkan Dengan Menggunakan Metode Pertimbangan Dan Survey Bab VII. Meramalkan Dengan Menggunakan G…

Edition
-
ISBN/ISSN
9795180843
Collation
x, 306 hlm.; 21 cm.
Series Title
-
Call Number
658.83 JOH t
Availability1
Add to basket
MARC DownloadCite
cover
Perception games untuk pelatihan manajemen
Comment Share
Adi Soenarno

Persepsi tercipta dari informasi-informasi yang ditangkap oleh panca indera manusia dan bercampur-baur dengan latar belakang ataupun nilai-nilai yang kita anut. Kondisi tersebut kerap menimbulkan perbedaan persepsi di berbagai kalangan saat dihadapkan pada persoalan yang sama. Dalam lingkungan kerja, perbedaan persepsi bisa menjadi bumerang. Akibatnya, bukannya menghasilkan suasana kerja yang k…

Edition
-
ISBN/ISSN
9797638138
Collation
xvi, 224 hlm.; 21 cm.
Series Title
-
Call Number
658.007 ADI p
Availability3
Add to basket
MARC DownloadCite
cover
Critical infrastructure: homeland security and emergency preparedness
Comment Share
Radvanovsky, RobertMcDougall, Allan

Contents: ch. 1 Introduction to Critical Infrastructure Assurance and Protection 1.1.Introduction 1.2.What Is Critical Infrastructure? 1.3.What Is the Private Sector? 1.4.What Is the Public Sector? 1.5.What Is CIP? 1.6.What Is CIA? 1.7.What Are Public-Private Partnerships? 1.8.Critical Infrastructure Functions 1.9.Evolution of Critical Infrastructure ch. 2 Demand, Capacity, Fragili…

Edition
Third Edition
ISBN/ISSN
9781466503458
Collation
xv, 257 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.34 RAD c
Availability1
Add to basket
MARC DownloadCite
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
cover
E-discovery: an introduction to digital evidence
Comment Share
Amelia, PhillipsGodfrey, RonaldSteuart, ChristopherBrown, Christine

Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery

Edition
--
ISBN/ISSN
9781111310646
Collation
xvi, 254 hal.; ilus.; 24 cm
Series Title
--
Call Number
347.73 PHI e
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
First Page Previous 31 32 33 34 35 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?