Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Cyber crime and cyber terrorism investigator's handbook
Comment Share
Akhgar, BabakStaniforth, AndrewBosco, Francesca M.

Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …

Edition
--
ISBN/ISSN
9780128007433
Collation
xxiii, 282 hal.; ilus.; 24 cm
Series Title
--
Call Number
R363.23 AKH c
Availability1
Add to basket
MARC DownloadCite
cover
The best damn cybercrime and digital forensics book period
Comment Share
Reyes, AnthonyCardwell, KevinWiles, Jack

Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/​electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…

Edition
--
ISBN/ISSN
9781597492287
Collation
xxxv, 699 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.23 REY b
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and applied mathematics
Comment Share
Metcalf, LeighCasey, William

Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…

Edition
--
ISBN/ISSN
9780128044520
Collation
xi, 188 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.820151 MET c
Availability2
Add to basket
MARC DownloadCite
cover
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Comment Share
Sood, Aditya KEnbody, Richard J

Table of Contents A Few Words About Targeted Cyber Attacks Acknowledgments About the Authors Overview Chapter 1. Introduction References Chapter 2. Intelligence Gathering 2.1 Intelligence Gathering Process 2.2 OSINT, CYBINT, and HUMINT 2.3 OSNs: A Case Study References Chapter 3. Infecting the Target 3.1 …

Edition
1st edition
ISBN/ISSN
9780128006047
Collation
xv, 142 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 SOO t
Availability1
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
cover
Cyber warfare: techniques, tactics and tools for security practitioners
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Acknowledgments Foreword Why a Book on Cyber Warfare Is Important Why Should You Read This Book Introduction Abstract Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion Chapter 1. What is Cyber Warfare? Abstract Information in This Chapter What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Import…

Edition
Second Edition
ISBN/ISSN
9780124166721
Collation
xi, 306 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 AND c
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber warfare: understanding the fundamentals of cyber warfare …
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…

Edition
1st edition
ISBN/ISSN
9780124047372
Collation
x, 150 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 WIN b
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cyber-warfare: a multidisciplinary approach
Comment Share
Shakarian, PauloShakarian, JanaRuef, Andrew

Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…

Edition
1st edition
ISBN/ISSN
9780124078147
Collation
xvii, 318 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 SHA i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and IT infrastructure protection
Comment Share
Vacca, John

Contents: 1. Fault tolerance and resilience in cloud computing environments 2. Data encryption 3. Public key infrastructure 4. Physical security essentials 5. Disaster recovery 6. Biometrics 7. Homeland security 8. Cyber warfare 9. System security 10. Securing the infrastructure 11. Access controls 12. Assessments and audits 13. Fundamentals of cryptography 14. Satell…

Edition
--
ISBN/ISSN
9780124166813
Collation
xxiv, 356 hal.;ilus.; 24 cm
Series Title
--
Call Number
005.8 VAC c
Availability2
Add to basket
MARC DownloadCite
cover
Web application vulnerabilities: detect, exploit, prevent
Comment Share
Cross, MichaelKapinos, StevenMeer, HaroonMuttik, IgorPalmer, Steve

Chapter 1: Introduction to web application hacking Introduction Web application architecture components Complex web application software components Putting it all together The web application hacking methodology The history of web application hacking and the evolution of tools Chapter 2: Information Gathering Techniques Introduction The principles of automating searches Ap…

Edition
1st edition
ISBN/ISSN
9781597492096
Collation
xv, 460 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.8 CRO w
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?