Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 53 from your keywords: subject="Computer crimes"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Kejahatan siber (cyber crime): suatu pengantar
Comment Share
Maskun

DAFTAR ISI Bagian I: Sistem telekomunikasi dan informatika A. Istilah dan pengertian telematika B. Sistem kerja telematika C. Kerangka hukum telematika D. Perbuatan yang dilarang menurut UU ITE Daftar bacaan Bagian II: Kejahatan siber A. Kejahatan dan teknologi B. Istilah, pengertian, dan ruang lingkup kejahatan siber C. Beberapa bentuk cyber crime D. Aturan hukum cyber crime E.…

Edition
--
ISBN/ISSN
9786029413939
Collation
viii, 220 hal.; ilus.; 21 cm
Series Title
--
Call Number
364.168 MAS k
Availability0
Add to basket
MARC DownloadCite
cover
Kejahatan mayantara (cyber crime)
Comment Share
Abdul WahidMohammad Labib

Daftar isi: Bab I Globalisasi teknologi dan Globalisasi kejahatan A . Perkembangan kejahatan di era globalisasi informasi B . Kejahatan sebagai bagian dari dampak teknologi C . Globalisasi Kejahatan : Tantangan bagi indonesia Bab II Eksistensi Kejahatan Mayantara A . Pengertian internet dan sejarah dunia cyber B . Pengertian krimonologi, kejahatan, kejahatan mayantara (cyber crime) d…

Edition
Cetakan kedua
ISBN/ISSN
9793304227
Collation
xiv, 160 hal.; ilus.; 21 cm
Series Title
--
Call Number
364.168 ABD k
Availability1
Add to basket
MARC DownloadCite
cover
Memerangi cybercrime: karakteristik, motivasi dan strategi penanganannya dala…
Comment Share
Widodo

Daftar isi: 1. Bahaya cybercrime dalam masyarakat 2. Kerangka dan konsep memerangi cybercrime dalam perspektif kriminologi 3. Keterkaitan kriminologi dan cybercrime 4. Pemanfaatan teori-teori kriminologi dalam memerangi cybercrime 5. Dimensi kriminologis cybercrime di Indonesia 6. Dimensi kriminologis cybercriminal di Indonesia 7. Analisis kriminologis terhadap upaya memerangi cybercrime…

Edition
--
ISBN/ISSN
9786027762954
Collation
xii, 215 hlm,; 24 cm.
Series Title
--
Call Number
364.1 WID m
Availability0
Add to basket
MARC DownloadCite
cover
Virtualization and forensics: a digital forensic investigator's guide to virt…
Comment Share
Kipper, GregoryBarret, Diane

Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…

Edition
--
ISBN/ISSN
9781597495578
Collation
xvii, 253 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAR v
Availability1
Add to basket
MARC DownloadCite
cover
Network forensics: tracking hackers through cyberspace
Comment Share
Davidoff, SherriHam, Jonathan

Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…

Edition
--
ISBN/ISSN
9780132564717
Collation
xxvi, 545 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV n
Availability1
Add to basket
MARC DownloadCite
cover
Computer incident response and forensics team management: conducting a succes…
Comment Share
Jhonson III, Leighton R.

Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…

Edition
--
ISBN/ISSN
9781597499965
Collation
xiii, 333 hal.; ilus.; 24cm
Series Title
--
Call Number
658.4 JOH c
Availability1
Add to basket
MARC DownloadCite
cover
CyberForensics Understanding Information Security Investigation
Comment Share
Jennifer Bayuk

1 Introduction 1 Jennifer Bayuk 2 The Complex World of Corporate CyberForensics Investigations 7 Gregory Leibolt 3 Investigating Large-Scale Data Breach Cases 29 J Andrew Valentine 4 Insider Threat Investigations 45 Shane Sims 5 Accounting Forensics 53 Tracy McBride 6 Analyzing Malicious Software 59 Lenny Zeltser 7 Network Packet Forensics 85 Eddie Schwartz 8 RAM and File …

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 BAY c
Availability0
Add to basket
MARC DownloadCite
cover
Introduction to computer operations
Comment Share
D'Arco, AnthonyFuori, William M.Orilia, Lawrence

This book is organized to facilitate students’ comprehension of the uses and operational aspects of the computer and its associated peripheral equipment. To accomplish this end, the text has been subdivided into six units as follows

Edition
Second Edition
ISBN/ISSN
134803922
Collation
xx, 620 hlm.; 24 cm.
Series Title
-
Call Number
005.7 FUO i
Availability1
Add to basket
MARC DownloadCite
cover
The next war zone: confronting the global threat of of cyber terrorism
Comment Share
Dunnigan, James F.

THE NEXT WAR ZONE CONFRONTING THE GLOBAL THREAT OF CYBERTERRORISM JAMES F. DUNNIGAN CHAPTER 1: Cyberwar and You 1 Technical Terms You Might Not Recognize in This Chapter 1 Good News, Bad News 2 Bringing the War Home 5 Let’s Just Do It 6 The Bad Guys and What They Do 7 Cyberwar 10 The Major Unknown 13 The Most Likely Cyberwars 14 The Usual Suspects 15 What Can Be Done? 17 CHAPTER…

Edition
-
ISBN/ISSN
806524138
Collation
xiii, 303 hlm.; 23 cm.
Series Title
-
Call Number
363.3 DUN n
Availability1
Add to basket
MARC DownloadCite
cover
Handbook of electronic security and digital forensics
Comment Share
Jahankhani, HamidLeonhardt, FrankMe, GianluigiWatson, David Lilburn

CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …

Edition
-
ISBN/ISSN
9789812837035
Collation
ix, 297 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
658.478 JAH h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?