Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Penetration testing: a hands-on guide for beginners
Comment Share
Wallace, Connor

This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or hacking. It will cover all the details completely from start to end. You will learn …

Edition
--
ISBN/ISSN
9798614981143
Collation
viii, 185 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WAL p
Availability1
Add to basket
MARC DownloadCite
cover
Information security science: measuring the vulnerability to data compromises
Comment Share
Young, Carl S.

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explo…

Edition
--
ISBN/ISSN
9780128096437
Collation
xx, 385 hm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 YOU i
Availability1
Add to basket
MARC DownloadCite
cover
Computer security principles and practices
Comment Share
Stallings, WilliamBrown, Lawrie

Table of Contents Chapter 0 Reader's and Instructor's guide Chapter 1 Overview PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Chapter 5 Database and Cloud Security Chapter 6 Malicious Software Chapter 7 Denial-of-Service Attacks Chapter 8 Intrusion Detection Chapter 9 Firewalls and Intrusio…

Edition
Third edition
ISBN/ISSN
9781292066172
Collation
840 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography apocalypse: preparing for the day when quantum computing breaks …
Comment Share
Grimes, Roger A.

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way …

Edition
--
ISBN/ISSN
9781119618195
Collation
xxiv, 248 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 GRI c
Availability1
Add to basket
MARC DownloadCite
cover
Advances in cyber security: principles, techniques, and applications
Comment Share
Chen, XiaofengLi, Kuan-ChingSusilo, Willy

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authenticati…

Edition
--
ISBN/ISSN
9789811314827
Collation
xix, 255 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 LI a
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Security fundamentals
Comment Share
Panek, Crystal

Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today’s businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational un…

Edition
-
ISBN/ISSN
9781119650669
Collation
xviii, 284 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 PAN s
Availability1
Add to basket
MARC DownloadCite
cover
Management of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…

Edition
Fifth Edition
ISBN/ISSN
9781305501256
Collation
xxii, 650 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WHI m
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?