Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1059 from your keywords: subject="Na"
First Page Previous 41 42 43 44 45 Next Last Page
cover
The grid core technologies
Comment Share
Li, MaozhenBaker, Mark

Contents; 1 An introduction to the grid Part One System infrastructure 2 OGSA and WSRF 3 The semantic grid and autonomic computing Part Two Basic services 4 Grid security 5 Grid monitoring Part Three Job management and user interaction 6 Grid scheduling and resource management 7 Workflow management for the grid 8 Grid portals Part Four Application 9 Grid applications-case…

Edition
--
ISBN/ISSN
9780470094174
Collation
xi, 423 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.36 Li g
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity to English dictionary
Comment Share
Meeuwisse, Raef

Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…

Edition
Third edition
ISBN/ISSN
9781911452102
Collation
xii, 106 hal.; 20 cm
Series Title
--
Call Number
R005.803 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Satellite and terrestrial hybrid networks
Comment Share
Berthou, PascalBaudoin, CedricGayraud, ThierryGineste, Matthieu

Contents: Chapter 1 Satellite and terrestrial hybrid networks 1.1 Designing satellite and terrestrial hybrid networks 1.2 Hybrid scenarios 1.3 Case study: loose coupling integration 1.4 Conclusion Chapter 2 Quality of service on next- generation terrestrial networks 2.1 IETF approach 2.2 ITU-NGN approach 2.3 Conclusion Chapter 3 Quality of service in DVB-S/RCS satellite networks…

Edition
--
ISBN/ISSN
9781848215412
Collation
xxi, 242 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.382 BER s
Availability1
Add to basket
MARC DownloadCite
cover
CISA: certified information systems auditor study guide
Comment Share
Cannon, David LO'Hara, Brian T.Keele, Allen

Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …

Edition
Fourth edition
ISBN/ISSN
9781119056249
Collation
lxiv, 632 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.4038 CAN c
Availability1
Add to basket
MARC DownloadCite
cover
CompTIA linux+/LPIC-1 certification all-in-on exam guide
Comment Share
Tracy, Robb H.

Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …

Edition
Second edition
ISBN/ISSN
9781259863691
Collation
liii, 810 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.446 TRA c
Availability1
Add to basket
MARC DownloadCite
cover
SSFIPS securing cisco networks with sourcefire intrusion prevention system st…
Comment Share
Lammle, ToddGay, JohnTatistcheff, Alex

Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…

Edition
--
ISBN/ISSN
9781119155034
Collation
xxix, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LAM s
Availability1
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
Digital signal processing: using the ARM cortex-M4
Comment Share
Reay, Donald S.

Contents: 1 ARM cortex-4M development systems 1.1 Introduction 2 Analog input and output 2.1 Introduction 2.2 TLV320AIC3104 (AIC3104)stereo codec for audio input and output 2.3 WM5102 audio hub codec for audio input and output 2.4 Programming examples 2.5 Real-time input output using polling, interrupts, and direct memory access (DMA) 2.6 Real-time waveform generation 2.7 Identif…

Edition
--
ISBN/ISSN
9781118859049
Collation
xii, 302 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.382 REA d
Availability2
Add to basket
MARC DownloadCite
cover
Advance in information systems set (volume 2): information and knowledge system
Comment Share
Arduin, Pierre-EmmanuelGrundstein, MichelRosenthal-Sabroux, Camille

Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …

Edition
--
ISBN/ISSN
9781848217522
Collation
xiii, 82 hal.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
004 ARD a
Availability1
Add to basket
MARC DownloadCite
cover
Hacking for dummies
Comment Share
Beaver, Kevin

Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…

Edition
6th Edition
ISBN/ISSN
9781119485476
Collation
xiv, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 BEA h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 41 42 43 44 45 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?