Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Panduan lengkap membangun sistem jaringan komputer dengan mikrotik routerOS
Comment Share
Madcoms

Panduan Lengkap Membangun Sistem Jaringan Komputer dengan Mikrotik RouterOS secara detail membahas tentang pengelolaan jaringan menggunakan RouterOS. Bahasan yang terkandung dalam buku ini cukup kompleks, namun disajikan dengan struktur kalimat yang mudah dimengerti secara teori dan juga dilengkapi dengan panduan langsung praktik sehingga materi akan lebih mudah dipahami. Selain pembahasan dan …

Edition
1
ISBN/ISSN
9789792972214
Collation
x, 290 hlm; ilus; 23 cm
Series Title
-
Call Number
004.6 MAD p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber law: aspek data privasi menurut hukum internasional, regional, dan nasi…
Comment Share
Sinta Dewi Rosadi

Buku ini ditulis dengan penuh pembaharuan, mengingat telah banyak perkembangan pengaturan hukum pelindungan data privasi baik secara internasional, regional maupun nasional. Rejim pengaturan data privasi telah berkembang dengan pesat baik di lingkup pemerintahan maupun swasta yang merupakan pihak yang memiliki kewajiban untuk dapat lebih melindungi data privasi individu, fenomena ini didorong d…

Edition
-
ISBN/ISSN
9786236232354
Collation
xii, 192 hlm.; ilus.; 24 cm
Series Title
-
Call Number
343 SIN c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity ??? attack and defense strategies: infrastructure security with…
Comment Share
Diogenes, YuriOzkaya Erdal

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in y…

Edition
First
ISBN/ISSN
9781788475297
Collation
viii, 367 hlm; 23 cm
Series Title
-
Call Number
005.8 DIO c
Availability1
Add to basket
MARC DownloadCite
cover
IPv6 security
Comment Share
Hogg, ScottVyncke, Eric

Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…

Edition
--
ISBN/ISSN
9781587055942
Collation
xxi, 540 hal.; ilus.; 23 cm
Series Title
Cisco Press networking technology series
Call Number
005.8 HOG i
Availability1
Add to basket
MARC DownloadCite
cover
Comptia security + guide to network security fundamentals (MindTap Course List)
Comment Share
Ciampa, Mark

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…

Edition
7th ed
ISBN/ISSN
9780357424377
Collation
xviii, 558 hlm.; ilus.; 27,5 cm
Series Title
-
Call Number
005.8 CIA c
Availability1
Add to basket
MARC DownloadCite
cover
Applied cyber security and the smart grid: implementing security controls int…
Comment Share
Knapp, Eric DSamani, RajLangill, Joel

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …

Edition
--
ISBN/ISSN
9781597499989
Collation
xxii, 202 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.310285 KNA a
Availability1
Add to basket
MARC DownloadCite
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
cover
DNS security : defending the Domain Name System
Comment Share
Liska, AllanStowe, GeoffreyGallo, Timothy

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security for cyber physical systems
Comment Share
Ali, SaqibAl Balushi, TaiseeraNadir, ZiaHussain, Omar Khadeer

Edition
-
ISBN/ISSN
9783319758794
Collation
xxi, 174 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 ALI c

Edition
-
ISBN/ISSN
9783319758794
Collation
xxi, 174 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 ALI c
Availability2
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?