Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Tutorial interaktif instalasi intrution prevention system berbasis open source
Comment Share
Aidil ChendramataSutanto Sugii JojiWisnu Linggakusuma

Daftar isi: Pendahuluan KLASIFIKASI HONEYPOT 1. Low- interaction honeypot 2. High-interaction henoypot HENEWALL OVERVIEW HONEYNET Arsitektur PETUNJUKAN KONFIGURASI HONEYWALL Konfigurassi honeywall dan honeypot STATUS HONEYWALL ADMINISTARASI SISTEM OPOERASI HONETWALL DAFTAR FUSTAKA

Edition
Cetakan kedua
ISBN/ISSN
--
Collation
x, 98 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID t
Availability1
Add to basket
MARC DownloadCite
cover
Tutorial interaktif keamanan web server menggunakan IPv6
Comment Share
Aidil ChendramataNasrullahLolly Amalia Abdullah

DAFTAR ISI: 1. Apache Web Server 2. Instalasi 3. Virtual Host 4. Apache SSL 5. Autentikasi menggunakan modul Auth Basic 6. Autentikasi menggunakan Modul Auth MySQL 7. Autentikasi menggunakan Modul Auth PgSQL 8. Mod Security 9. Installasi 10. Chroot Apache 11. Mengubah Server Signature pada Apache 12. Reverse Proxy pada Apache menggunakan Mod Proxy 13. Tips dan Trik pada Apache 14.…

Edition
--
ISBN/ISSN
-
Collation
vi, 84 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 LOL t
Availability2
Add to basket
MARC DownloadCite
cover
Designing network security
Comment Share
Kaeo, Merike

Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …

Edition
--
ISBN/ISSN
1578700434
Collation
xv, 426 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAE d
Availability1
Add to basket
MARC DownloadCite
cover
Computational intelligence in information assurance and security
Comment Share
Nedjah, NadiaAbraham, AjithMourelle, Luiza de Macedo

Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…

Edition
--
ISBN/ISSN
9783540710776
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
Studies in computational intelligence
Call Number
005.8 NED c
Availability1
Add to basket
MARC DownloadCite
cover
Bongkar Rahasia E-Banking Security dengan Tehnik Hacking dan Carding
Comment Share
Vyctoria

Daftar isi: BAB 1 TEKNOLIGI PERBANKAN ATM Phone Banking SMS/M-Banking Internet Banking BAB 2 MENGENAL ATM Komponen ATM Software ATM Fasilitas Keamanan pada Software ATM Cara Kerja ATM Jenis-jenis ATM Produsen ATM BAB 3 KARTU ATM & KARTU KREDIT Anatomi Kartu ATM & Kartu Kredit Magnetic Stripe Nomor Kartu Memeriksa Nomor Kartu BAB 4 ATM SECURITY Card Trapping Stiker …

Edition
Ed. I
ISBN/ISSN
9789792934663
Collation
viii, 254 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 VYC b
Availability3
Add to basket
MARC DownloadCite
cover
Tutorial interaktif keamanan aplikasi dan database server berbasis open source
Comment Share
Aidil ChendramataAdhityo Priambodo

DAFTAR ISI ARSITEKTUR KEAMANAN APLIKASI DAN SERVER DATABASE SECURE SOCKET LAYER Instalasi Secure Socket Layer Konfigurasi Secure Socket Layer Pembuatan Certificate of Authority (CA) Pembuatan Certificate Signing Request (CSR) Pengesahan CSR Oleh Certificate Authority REFERENSI FILE SERVER Instalasi Samba File Server Konfigurasi Samba File Server Pengaktifan Ulang Server SAMBA …

Edition
Cetakan keempat (Edisi Revisi)
ISBN/ISSN
--
Collation
viii, 127 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID t
Availability2
Add to basket
MARC DownloadCite
cover
Information security governace simplified: from the boardroom to the keyboard
Comment Share
Fitzgerald, Todd

Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…

Edition
--
ISBN/ISSN
9781439811634
Collation
xxviii, 383 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8068 FIT i
Availability2
Add to basket
MARC DownloadCite
cover
Information security policy development for compliance: ISO/IEC 27001, NIST S…
Comment Share
Williams, Barry L.

Contents: Introduction Entity-Level Policies and Procedures Access-Control Policies and Procedures Change Control and Change Management System Information Integrity and Monitoring System Services Acquisition and Protection Informational Asset Management Continuity of Operations Appendices: ISO / IEC 27001 (Annex A) Controls(c) ISO NIST S P 800-53 Controls HIPAA Security R…

Edition
--
ISBN/ISSN
9781466580589
Collation
x, 142 hal.; ilus.; 24cm
Series Title
--
Call Number
005.8068 WIL i
Availability3
Add to basket
MARC DownloadCite
cover
Hacking internet banking
Comment Share
Aat Shadewa

Daftar isi: 1. All about internet banking dkk (semua tentang internet babking dan kawan-kawannya 2. PIN dan kartu kredit pasangan yang pas 3. Menelusuri sistem internet banking 4. SQL injection onleh!!! KubiS (KUpas Abis) SQL injection 5. Bab yang cidak ada jwudwul

Edition
Edisi I
ISBN/ISSN
9789792571844
Collation
xvi, 167 hlm.; ilus.; 21 cm.
Series Title
--
Call Number
005.84 AAT h
Availability1
Add to basket
MARC DownloadCite
cover
Implementing SSL/TLS using cryptography and PKI
Comment Share
Davies, Joshua

Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…

Edition
--
ISBN/ISSN
9780470920411
Collation
xxxii, 663 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?