Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 31 32 33 34 35 Next Last Page
cover
Fundamentals of technology project management
Comment Share
Garton, ColleenMcCulloch, Erika

Table of contents: Introduction 1. Concepts of Project Management 2. Project Management Methodologies 3. Project Initiation 4. Advancing Beyond the Greenlight 5. The Project Plan &​ Project Approach 6. Project Kick-Off 7. Project Design 8. Creating The Project Schedule 9. Project Development 10. Managing Obstacles and Risks 11. Managing Communication 12. Integration and Testing …

Edition
2nd Edition
ISBN/ISSN
9781583473399
Collation
xxiii, 705 hal.; ilus.; 23 cm
Series Title
--
Call Number
658.404 GAR f
Availability1
Add to basket
MARC DownloadCite
cover
New dimensions in privacy law: international and comparative perspectives
Comment Share
Kenyon, Andrew T.Richardson, Megan

Table of Contents 1. New dimensions in privacy: communications technologies, media practices and law Andrew T. Kenyon and Megan Richardson 2. Privacy and freedom of speech Eric Barendt 3. Revisiting the American action for public disclosure of private facts Brian C. Murchison 4. The internet and the private life in Europe: risks and aspirations Yves Poullet and J. Marc Dinant 5. APEC's p…

Edition
1st edition
ISBN/ISSN
9780521187657
Collation
ix, 296 hal.; ilus.; 24 cm
Series Title
--
Call Number
342.0858 KEN n
Availability1
Add to basket
MARC DownloadCite
cover
Snort IDS and IPS toolkit
Comment Share
Baker, Andrew R.Esler, Joel

Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…

Edition
--
ISBN/ISSN
9781597490993
Collation
xxxiv, 729 hal.; ilus.; 25 cm
Series Title
Jay beale's open source security series
Call Number
005.8 BAK s
Availability2
Add to basket
MARC DownloadCite
cover
Network security auditing
Comment Share
Jackson, Chris

Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…

Edition
1st edition
ISBN/ISSN
9781587053528
Collation
xxiv, 488 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 JAC n
Availability1
Add to basket
MARC DownloadCite
cover
Handbook on securing cyber-physical critical infrastructure
Comment Share
Das, Sajal KumarKant, Krishna

Table of contents PART I. Theoretical Foundations Introduction Chapter 1. Security and Vulnerability of Cyber-Physical Infrastructure Networks 1.1 Introduction 1.2 Definitions for Security and Vulnerability of Network Dynamics 1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability 1.4 Conclusions and Future Work Chapter 2. Game Theory for Infrastruct…

Edition
1st edition
ISBN/ISSN
9780124158153
Collation
xxx, 817 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.8 DAS h
Availability1
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
A guide to kernel exploitation : attacking the core
Comment Share
Perla, EnricoMassimiliano, Oldani

pt. I A JOURNEY TO KERNEL LAND ch. 1 From User-Land to Kernel-Land Attacks Introduction Introducing the Kernel and the World of Kernel Exploitation Why Doesn't My User-Land Exploit Work Anymore? An Exploit Writer's View of the Kernel User-Land Processes and the Scheduler Open Source versus Closed Source Operating Systems ch. 2 A Taxonomy of Kernel Vulnerabilities Uninitializ…

Edition
--
ISBN/ISSN
9781597494861
Collation
xxi, 442 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 PER g
Availability1
Add to basket
MARC DownloadCite
cover
Managing an information security and privacy awareness and training program
Comment Share
Herold, Rebecca

Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …

Edition
2nd Edition
ISBN/ISSN
9781439815458
Collation
xxx, 538 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.478 HER m
Availability1
Add to basket
MARC DownloadCite
cover
Microsoft Windows Security Essentials
Comment Share
Gibson, Darril

Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…

Edition
--
ISBN/ISSN
9781118016848
Collation
xxiv, 312 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GIB m
Availability1
Add to basket
MARC DownloadCite
cover
Governance in cyberspace: access and public interest in global communications
Comment Share
Grewlich, Klaus W

Contents: Ch.1 Introduction: approach and workplan Ch.2 Cyberspace Ch.3 Development and cyberspace: finance-universal access-cultural identity Ch.4 Competing cyber policies: US,EU,Japan Ch.5 Cyber regulation: access - the European example Ch.6 Trust: digital signatures and encryption Ch.7 Internet domain names Ch.8 Intellectual property rights Ch.9 Freedom of expression and human digni…

Edition
--
ISBN/ISSN
9041112251
Collation
xxii, 405 hal.; ilus.; 25 cm
Series Title
--
Call Number
384.3 GRE g
Availability1
Add to basket
MARC DownloadCite
First Page Previous 31 32 33 34 35 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?