Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 54 from your keywords: subject="Komputer -- Pengamana...
First Page Previous 1 2 3 4 5 Next Last Page
cover
Keamanan multimedia: konsep dan aplikasi
Comment Share
Dony Ariyus

Daftar isi: 1. PENDAHULUAN 1.1 Pendahuluan 1.2 Multimedia 1.3 Masalah keamanan 1.4 Ancaman keamanan 1.5 Aspek aspek keamanan komputer 2. PEMAHAMAN DASAR KEAMANAN MULTIMEDIA 2.1 Pendahuluan 2.2 Cryptography 2.3 Steganography 2.4 Digital watermarking 3. STEGANOGRAPHY 3.1 Pendahuluan 3.2 Sejarah steganography 3.3 Teknik steganography 3.4 Embeding methods 3.5 Method leaset 3…

Edition
Ed. I
ISBN/ISSN
9789792902891
Collation
xii, 338 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 DON k
Availability2
Add to basket
MARC DownloadCite
cover
Securing the borderless network: security for the web 2.0 world
Comment Share
Gillis, Tom

Contents Chapter 1 Network security-yesterday, today, and tomorrow Chapter 2 Collaboration and web 2.0 technologies Chapter 3 Building relationships with web 2.0 Chapter 4 The cloud computing revolution Chapter 5 You’re in san jose , i’m in bangalore-lets’s meet Chapter 6 Watson, can ypu hear us ? Chapter 7 The consumerization of IT Chapter 8 The bad guys from outside : Malware…

Edition
--
ISBN/ISSN
9781587058868
Collation
xvi, 1528 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 GIL t
Availability1
Add to basket
MARC DownloadCite
cover
Seni hacking menggunakan T.R.O.J.A.N
Comment Share
Aat Shadewa

Daftar isi: BAB 1 Menyusup itu bernama T.R.O.J.A.N Penyamaran Hati-hati dengan privasi T.R.O.J.A.N Intisari cerita Apa sihh sebenarnya trojan itu Cara kerja trojan BAB 2 Cerita tentang jaringan DKK System administator Network administator Lan Wan Internet Tcp/ip dan internet Fitur-fitur tcp/ip Model-model tcp/ip Tcp/ip model osi Arsitektur protokol tcp/ip Struktur data…

Edition
Edisi I
ISBN/ISSN
9789792571875
Collation
xii, 193 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 AAT s
Availability1
Add to basket
MARC DownloadCite
cover
Konfigurasi sekuriti jaringan Cisco
Comment Share
Rahmat Rafiudin

Daftar Isi: BAB 1 PENDAHULUAN SEKURITI JARINGAN IP 1.1 Empat Layar Stack TCP/IP 1.2 Sekuriti Jaringan 1.3 Access Control 1.4 Sekuriti Dalam TCP/IP 1.5 Software dan Hardware IP Scurity Sico BAB 2 TRAFFIC FILTRING: SICO ISO ACCESS LIST 2.1 Mengenal Access List 2.2 Sekilas Konfigurasi Access List 2.3 Standard Access Liset 2.4 Extended Access List 2.5 Pengujian Dan Pemeriksaan…

Edition
--
ISBN/ISSN
9792072691
Collation
xv, 278 hlm.; ilus.; 21 cm.
Series Title
--
Call Number
005.8 RAH k
Availability1
Add to basket
MARC DownloadCite
cover
A guide to computer network security
Comment Share
Kizza, Joseph Migga

Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…

Edition
--
ISBN/ISSN
9781848009165
Collation
xxiv, 472 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 KIZ a
Availability2
Add to basket
MARC DownloadCite
cover
Tutorial interaktif instalasi intrution prevention system berbasis open source
Comment Share
Aidil ChendramataSutanto Sugii JojiWisnu Linggakusuma

Daftar isi: Pendahuluan KLASIFIKASI HONEYPOT 1. Low- interaction honeypot 2. High-interaction henoypot HENEWALL OVERVIEW HONEYNET Arsitektur PETUNJUKAN KONFIGURASI HONEYWALL Konfigurassi honeywall dan honeypot STATUS HONEYWALL ADMINISTARASI SISTEM OPOERASI HONETWALL DAFTAR FUSTAKA

Edition
Cetakan kedua
ISBN/ISSN
--
Collation
x, 98 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID t
Availability1
Add to basket
MARC DownloadCite
cover
Tutorial interaktif keamanan web server menggunakan IPv6
Comment Share
Aidil ChendramataNasrullahLolly Amalia Abdullah

DAFTAR ISI: 1. Apache Web Server 2. Instalasi 3. Virtual Host 4. Apache SSL 5. Autentikasi menggunakan modul Auth Basic 6. Autentikasi menggunakan Modul Auth MySQL 7. Autentikasi menggunakan Modul Auth PgSQL 8. Mod Security 9. Installasi 10. Chroot Apache 11. Mengubah Server Signature pada Apache 12. Reverse Proxy pada Apache menggunakan Mod Proxy 13. Tips dan Trik pada Apache 14.…

Edition
--
ISBN/ISSN
-
Collation
vi, 84 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 LOL t
Availability2
Add to basket
MARC DownloadCite
cover
Pengamanan sistem komputer
Comment Share
Janner Simarmata

Daftar Isi: 1. Pengantar Keamanan Komputer 2. Virus Komputer 3. Memahami Spyware 4. Keamanan dalam e-business 5. Keamanan Terhadap Jaringan 6. Hacking dan Cracking 7. Kriptografi

Edition
Ed. I
ISBN/ISSN
9789797631222
Collation
xviii, 252 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 JAN p
Availability2
Add to basket
MARC DownloadCite
cover
Bongkar Rahasia E-Banking Security dengan Tehnik Hacking dan Carding
Comment Share
Vyctoria

Daftar isi: BAB 1 TEKNOLIGI PERBANKAN ATM Phone Banking SMS/M-Banking Internet Banking BAB 2 MENGENAL ATM Komponen ATM Software ATM Fasilitas Keamanan pada Software ATM Cara Kerja ATM Jenis-jenis ATM Produsen ATM BAB 3 KARTU ATM & KARTU KREDIT Anatomi Kartu ATM & Kartu Kredit Magnetic Stripe Nomor Kartu Memeriksa Nomor Kartu BAB 4 ATM SECURITY Card Trapping Stiker …

Edition
Ed. I
ISBN/ISSN
9789792934663
Collation
viii, 254 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 VYC b
Availability3
Add to basket
MARC DownloadCite
cover
Tutorial interaktif keamanan aplikasi dan database server berbasis open source
Comment Share
Aidil ChendramataAdhityo Priambodo

DAFTAR ISI ARSITEKTUR KEAMANAN APLIKASI DAN SERVER DATABASE SECURE SOCKET LAYER Instalasi Secure Socket Layer Konfigurasi Secure Socket Layer Pembuatan Certificate of Authority (CA) Pembuatan Certificate Signing Request (CSR) Pengesahan CSR Oleh Certificate Authority REFERENSI FILE SERVER Instalasi Samba File Server Konfigurasi Samba File Server Pengaktifan Ulang Server SAMBA …

Edition
Cetakan keempat (Edisi Revisi)
ISBN/ISSN
--
Collation
viii, 127 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID t
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?