Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 156 from your keywords: subject="security measures"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
cover
Click here to kill everybody: security and survival in a hyper-connected world
Comment Share
Schneier, Bruce

Table of Contents Introduction: Everything is Becoming a Computer Part 1: The Trends 1. Computers Are Still Hard to Secure 2. Patching Is Failing as a Security Paradigm 3. Knowing Who’s Who on the Internet Is Getting Harder 4. Everyone Favors Insecurity 5. Risks are Becoming Catastrophic Part 2: The Solutions 6. What a Secure Internet+ Looks Like 7. How We Can Secure the Interne…

Edition
-
ISBN/ISSN
9780393608885
Collation
viii, 319 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
DNS security : defending the Domain Name System
Comment Share
Liska, AllanStowe, GeoffreyGallo, Timothy

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d
Availability1
Add to basket
MARC DownloadCite
cover
The digital big bang : the hard stuff, the soft stuff, and the future of cybe…
Comment Share
Quade, Phil

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for CEOs and management
Comment Share
Willson, DavidDalziel, Henry

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and pro…

Edition
-
ISBN/ISSN
9780128047545
Collation
xi, 42 hm.: ilus.; 23 cm
Series Title
-
Call Number
658.4 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for corporate directors and board members
Comment Share
Willson, DavidDalziel, Henry

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Bahan ajar fundamental keamanan informasi
Comment Share
Arif Rahman HakimSeptia Ulfa SunaringtyasIra Rosianal Hikmah

DAFTAR ISI BAB 1 PENGENALAN KEAMANAN INFORMASI A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Keamanan Informasi D. Definisi Keamanan Informasi E. Konsep C.I.A. F. Beberapa Istilah dalam Keamanan Informasi G. Arsitektur Keamanan Informasi H. Keamanan dalam System Life Cycle I. Evaluasi / Soal Latihan BAB 2 URGENSI KEAMANAN INFORMASI A. Tujuan Pembelajaran B…

Edition
-
ISBN/ISSN
-
Collation
iv, 183 hlm.; ilus.; 30 cm
Series Title
-
Call Number
005.8 ARI b
Availability3
Add to basket
MARC DownloadCite
cover
Bahan ajar perimeter keamanan jaringan
Comment Share
Nanang TriantoObrina Candra BriliyantJeckson Sidabutar

DAFTAR ISI BAB 1 Mengenal Keamanan Perimeter Jaringan A. Tujuan Pembelajaran B. Pendahuluan C. Terminologi D. Defense in Depth E. Studi Kasus Defense in Depth BAB 2 Firewall A. Tujuan Pembelajaran B. Pendahuluan C. Definisi Firewall D. Tujuan Firewall E. Teknik yang digunakan Firewall F. Arsitektur Firewall G. Tipe-tipe Firewall H. Praktikum Instalasi…

Edition
-
ISBN/ISSN
-
Collation
vi, 298 hlm.; ilus.; 30 cm
Series Title
-
Call Number
005.8 OBR b
Availability3
Add to basket
MARC DownloadCite
cover
Deteksi intrusi menggunakan Python
Comment Share
Kurnia Adi CahyantoMuhammad Anis Al HilmiMuhammad Mustamiin

Daftar isi Bab 1 Deteksi Intrusi Web server Log server Intrusion Detection System (IDS) Metode deteksi Anomali protokol Jenis serangan yang dapat dideteksi IDS Data mining dan kaitannya dengan IDS Bab 2 Data mining Sejarah data mining Pengertian data mining Penerapan data mining Metode pembelajaran dalam data mining Peran dan funsi data mining Bab 3 Ba…

Edition
-
ISBN/ISSN
9786237715719
Collation
xiv, 156 hlm.; ilus.; 20cm.
Series Title
-
Call Number
005.8 KUR d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?