Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 31 32 33 34 35 Next Last Page
cover
Digital watermarking and steganography: fundamentals and techniques
Comment Share
Shih, Frank Y.

Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …

Edition
Second Edition
ISBN/ISSN
9781498738767
Collation
xxii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SHI d
Availability0
Add to basket
MARC DownloadCite
cover
SSFIPS securing cisco networks with sourcefire intrusion prevention system st…
Comment Share
Lammle, ToddGay, JohnTatistcheff, Alex

Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…

Edition
--
ISBN/ISSN
9781119155034
Collation
xxix, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LAM s
Availability1
Add to basket
MARC DownloadCite
cover
The network security test lab: a step-by-step guide
Comment Share
Gregg, Michael

CONTENTS: 1. Building a Hardware and Software Test Platform 2. Passive Information Gathering 3. Analyzing Network Traffic 4. Detecting Live Systems and Analyzing Results 5. Enumerating Systems 6. Automating Encryption and Tunneling Techniques 7. Automated Attack and Penetration Tools 8. Securing Wireless Systems 9. An Introduction to Malware 10. Detecting Intrusions and Analyzing Malw…

Edition
--
ISBN/ISSN
9781118987056
Collation
xxiv, 454 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 GRE n
Availability3
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
Electronic access control
Comment Share
Norman, Thomas L.

Contents: PART I THE BASICS Chapter 1 Introduction and overview Chapter 2 Foundational security and access control concepts Chapter 3 How electronic access control systems work PART II HOW THINGS WORK Chapter 4 Access control credentials and credential readers Chapter 5 Types of access controlled portals Chapter 6 Life safety and exit devices Chapter 7 Door types and door f…

Edition
Second Edition
ISBN/ISSN
9780128054659
Collation
xix, 544 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.389 NOR e
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security basics: protect your organization by applying the fundamentals
Comment Share
Franke, Don

Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …

Edition
--
ISBN/ISSN
9781522952190
Collation
98 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FRA c
Availability1
Add to basket
MARC DownloadCite
cover
Digital signatures
Comment Share
Katz, Jonathan

Contents: Part I Setting the stage 1 Digital signatures: beckground and definitions 2 Cryprographic harness assumptions Part II Digital signature schemes without random oracles 3 Constructions based on general assumptions 4 Signature schemes based on the (strong) RSA assumption 5 Constructions based on bilinear maps Part III Digital signature shemes in the random oracle model 6 T…

Edition
--
ISBN/ISSN
9780387277110
Collation
xiii, 192 hal.; 24 cm
Series Title
--
Call Number
005.8 KAT d
Availability2
Add to basket
MARC DownloadCite
cover
Operating system security
Comment Share
Jaeger, TrentSandhu, Ravi

Table of Contents: 1. Introduction 2. Access Control Fundamentals 3. Multics 4. Security in Ordinary Operating Systems 5. Verifiable Security Goals 6. Security Kernels 7. Securing Commercial Operating Systems 8. Case Study: Solaris Trusted Extensions 9. Case Study: Building a Secure Operating System for Linux 10. Secure Capability Systems 11. Secure Virtual Machine Systems …

Edition
--
ISBN/ISSN
9781598292121
Collation
xvii, 218 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 JAE o
Availability2
Add to basket
MARC DownloadCite
cover
Hacking for dummies
Comment Share
Beaver, Kevin

Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…

Edition
6th Edition
ISBN/ISSN
9781119485476
Collation
xiv, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 BEA h
Availability1
Add to basket
MARC DownloadCite
cover
Security jaringan komputer berbasis CEH
Comment Share
Rifkie Primartha

Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…

Edition
--
ISBN/ISSN
9786026232571
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.84 RIF s
Availability4
Add to basket
MARC DownloadCite
First Page Previous 31 32 33 34 35 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?