Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 36 37 38 39 40 Next Last Page
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkMcDonald, JohnSchuh, Justin

Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459

Edition
--
ISBN/ISSN
9780321444424
Collation
xxi, 557 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOW a1
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkSchuh, JustinMcDonald, Jhon

10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

Edition
--
ISBN/ISSN
9780321444424
Collation
569 hal.; ilus.; 23cm
Series Title
--
Call Number
005.8 DOW a2
Availability1
Add to basket
MARC DownloadCite
cover
Cyberwar: law and ethics for virtual conflicts
Comment Share
Ohlin, Jeens DavidGovern, KevinFinkelstein, Claire

Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" /​ Larry May 2.Is There Anything Morally Special about Cyberwar? /​ James L Cook 3.Cyber Causation /​ Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law /​ Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…

Edition
--
ISBN/ISSN
9780198717508
Collation
xxxii, 274 hal.; 25 cm.
Series Title
--
Call Number
341.6 OHL c
Availability1
Add to basket
MARC DownloadCite
cover
Network performance and security: testing and analyzing using open source and…
Comment Share
Chapman, Chris

Contents: 1. Introduction to practical security and performance testing 2. Getting organized with initial audit of tnetworkwrk 3. Locking down the infrastructure: internet, wi-fi, wired, VPN, WAN, and the core 4. Locking down and optimizing the Windows client 5. Server patterns 6. Testing for security flaws using penetration testing 7. Using Wireshark and TCP Dump to visualize traffic 8…

Edition
--
ISBN/ISSN
9780128035849
Collation
xiv, 366 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.82 CHA n
Availability1
Add to basket
MARC DownloadCite
cover
The Complete Reference Network Security
Comment Share
Keith StrassbergRoberta BraggMark Rodes Qusley

The Complete Reference Network Security Daftar Isi Part I Network Security Foundation 1. Network Security Overview 3 2. Risk Analysis and Defense Mode 31 3. Security Policy Development 47 4. Security Organization 81 Part II Access Control 5. Physical Security 117 6. Authentication and Authorization Controls 127 7. Data Security Architecture 153 8. Security Management Architecture 175…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
R 005.8 BRA c
Availability0
Add to basket
MARC DownloadCite
cover
Wireless Security : Models, Threats, and Solutions
Comment Share
Panos C. LekkasRandal K. Nichols

Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 NIC w
Availability0
Add to basket
MARC DownloadCite
cover
Network Security : Current Status and Future Directions
Comment Share
Christos DouligerisDimitrios N. Serpanos

Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.82 DOU n
Availability0
Add to basket
MARC DownloadCite
cover
CLOUD SECURITY: A Comprehensive Guide to Secure Cloud Computing
Comment Share
Ronald L. KrutzRussel Dean Vines

Table of Contents Foreword xxi Introduction xxiii Chapter 1 Cloud Computing Fundamentals 1 What Cloud Computing Isn’t 7 Alternative Views 8 Essential Characteristics 9 On-Demand Self-Service 9 Broad Network Access 10 Location-Independent Resource Pooling 10 Rapid Elasticity 10 Measured Service 11 Architectural Influences 11 High-Performance Computing 11 Utility and Enterprise Gr…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 KRU c
Availability0
Add to basket
MARC DownloadCite
cover
Computer security handbook
Comment Share
Bosworth, SeymourHoyt, Douglas B.Hutt, Arthur E.

Contents List of Contributors xii Preface xxi Introduction xxiii Part I Management Responsibility 1 1. Chapter 1: Management’s Role in Computer Security 3 2. Chapter 2: Information Security Risk Management 22 3. Chapter 3: Employees 33 4. Chapter 4: Legal Issues in Computer Security 46 5. Chapter 5: Computer Crime and Computer Criminals 58 Part II Basic Safeguards 81 6. Chapter 6: …

Edition
Second Edition
ISBN/ISSN
002915300X
Collation
xxiii, 399 hlm.; ilus.; 29 cm.
Series Title
-
Call Number
R 005.8 HUT C
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security:principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780131115026
Collation
xiv, 681 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?