Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 31 32 33 34 35 Next Last Page
cover
Anti privacy: melacak, membajak, & memobol data rahasia
Comment Share
Efvy ZamSudarma S

Daftar isi Bab 1 Melacak file tersembunyi File hidden Memeriksa file tersembunyi File super hidden Memburu file tersembunyi Bab 2 Mengatasi folder yang terkunci Membuka folder terlarang Membuka folder yang diproteksi aplikasi Bab 3 Mengendus CACLS & data streams Mengatasi CACLS Mendeteksi data streams Bab 4 Ngepet file Menyedot sisi flashdisk Membajak data CD-ROM …

Edition
--
ISBN/ISSN
9797944239
Collation
viii, 192 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 EFV a
Availability1
Add to basket
MARC DownloadCite
cover
CEH certified ethical hacker all-in-one exam guide
Comment Share
Walker, Matt

CONTENTS: Chapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Hacking Through the Network: Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Low Tech: Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applica…

Edition
--
ISBN/ISSN
9780071772297
Collation
xxii, 391 hlm.: ilus.; 24 cm.
Series Title
--
Call Number
005.84 WAL c
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 100 % illegal
Comment Share
S'to

Daftar isi: Module 1. Pemahaman dasar ethical hacker Kenapa keamanan computer menjadi penting Terminologi-terminologi dasar Element-element keamanan Tahapan aktifitas hacking Pengelompokan jenis serangan Hacktivistm Ethical hacking atau hacking beretika Vulnerability research dan tools Bagaimana ethical hacker bekerja Jenis testing Metodologi testing Module 2. Footprinting Men…

Edition
Cetakan kedua
ISBN/ISSN
9789791090216
Collation
viii, 200 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c
Availability0
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 200 % illegal
Comment Share
S'to

Daftar isi: MODULE 6: ENUMERATION BAB 1 Enumeration Enumeration Null sessions Enumerasi active directory MODULE 7: SYSTEM HACKING BAB 2 Password cracking Active online attacks Passive online attacks Offline attacks Non electronic attacks BAB 3 Escalating privileges BAB 4 Executing application, keylogger & spyware Executing appli…

Edition
Cetakan kedua
ISBN/ISSN
9789791090278
Collation
vi, 202 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c2
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 400% illegal
Comment Share
S'to

Daftar isi: Module 10. Sniffer BAB 1. Sniffer, si tukang intip Ethernet dan topologi jaringan CSMA/CD Hub Switch Brosur switch Enkapsulasi dan dekapsulasi Type sniffing Protokol yang bermasalah Network viever tools Passive sniffing Active sniffing BAB 2. DNS poisoning techniques Intranet DNS spoofing Internet DNS spoofing Proxy server DNS poisoning DNS cache Poisoning B…

Edition
Cetakan pertama
ISBN/ISSN
9789791090452
Collation
viii, 188 hlm.; ILUS.; 21 cm
Series Title
--
Call Number
005.84 STO c4
Availability1
Add to basket
MARC DownloadCite
cover
Security for web services and service-oriented architectures
Comment Share
Bertino, ElisaMartino, LorenzoPaci, FedericaSquicciarini, Anna

Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends

Edition
--
ISBN/ISSN
9783540877417
Collation
xii, 226 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BER s
Availability1
Add to basket
MARC DownloadCite
cover
Fundamental of PHP security
Comment Share
Wiwit Siswoutomo

Daftar isi: Bab 1 Validasi input 1.1 Validasi angka 1.2 Validasi string 1.3 Input yang membingungkan 1.4 Problema file Bab 2 Cross-site scripting 2.1 Enconding solution 2.2 Menangani atribut 2.3 Mengakali filter 2.4 Strip-tags () 2.5 Environtmen variables Bab 3 SQL injection 3.1 Magic quates 3.2 Ketepatan tipe data 3.3 Penyerangan like 3.4 SQL error handling 3.5 File inc…

Edition
Pertama
ISBN/ISSN
9789792705270
Collation
vii, 207 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 WIW f
Availability1
Add to basket
MARC DownloadCite
cover
Kumpulan tool proteksi PC dan jaringan
Comment Share
Oktaviani Hastu Sudiyarto

Daftar isi: Bab I Aplikasi Antivirus Bab II Aplikasi Imaging System Bab III Aplikasi File Recovery Bab IV Aplikasi Dekstop Locker Bab V Aplikasi Perawatan Sistem Bab VI Aplikasi proteksi folder Bab VII Aplikasi Pop up blocker Bab VIII Aplikasi firewall Bab IX Aplikasi

Edition
Ed. I
ISBN/ISSN
9797630641
Collation
x, 258 hlm.; ilus.; 23 cm
Series Title
Seri Populer
Call Number
005.8 OKT k
Availability1
Add to basket
MARC DownloadCite
cover
Advances in security technology: International conference, SecTech 2008, and …
Comment Share
Kim, Haeng-konKim, Tai-hoonKiumi, Akingbehin

Contents: Security analysis of a novel elliptic curve dynamic access control system VoIP SPAM response system adopting multi-leveled anti-SPIT solutions Feature extraction for IRIS recognition Bidirectional quantum secure direct communication based on entanglement Study and implementation of selinux-like access control mechanism based on linux Research on streaming dta integration syste…

Edition
--
ISBN/ISSN
9783642102394
Collation
xii, 161 hlm.; ilus.; 24 cm
Series Title
Communications in Computer and Information Science
Call Number
R005.8 KIM a
Availability1
Add to basket
MARC DownloadCite
cover
Security in wireless ad hoc and sensor networks
Comment Share
Cayirci, ErdalRong, Chunming

Termasuk bibliografi dan indeks. Contents Part one . Wireless ad hoc,Sensor and Mesh Networking 1. Introduction 2. Wireless Ad Hoc, Sensor and Mesh Networks 3. The Wireless Medium 4. Medium Access and error Control 5. Routing 6. Reliability, Flow and Congestion Control 7. Other Challenges and Security aspects Part Two. Security in Wireless Ad Hoc, Sensor and Mesh Networking…

Edition
First Edition
ISBN/ISSN
9780470027486
Collation
xii, 257 hlm.; ilus.; 25 cm
Series Title
--
Call Number
005.8 CAY s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 31 32 33 34 35 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?