Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 108 from your keywords: subject="Internet"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Implementasi skema autentikasi berbasis Lightweight One Time Pad dan biometri…
Comment Share
Andriani Adi LestariMohamad SyahralArizalMuhammad Dandy Pramana

Teknologi internet of things saat ini telah banyak memberikan manfaat positif pada pekerjaan manusia. Namun disisi lain banyak pula sisi negatif dari celah kerawanan yang tiga diantaranya adalah kendali akses, autentikasi dan kerahasiaan. Telah banyak penelitian membahas cara mengamankan teknologi internet of things dan salah satunya adalah skema Imran et al. Skema yang ditawarkan imran et al. …

Edition
--
ISBN/ISSN
--
Collation
xvi, 91 hlm
Series Title
-
Call Number
2021 MUH i
Availability2
Add to basket
MARC DownloadCite
cover
Internet of things : principles and paradigms
Comment Share
Buyya, RajkumarDastjerdi, Amir Vahid

Contents: Part I: IoT ecosystem concepts and architectures Chapter 1: Internet of Things: an overview 1.1. Introduction 1.2. Internet of Things definition evolution 1.3. IoT architectures 1.4. Resource management 1.5. IoT data management and analytics 1.6. Communication protocols 1.7. Internet of Things applications 1.8. Security 1.9. Identity management and authentication 1.10. P…

Edition
1st edition
ISBN/ISSN
9780128053959
Collation
xxiii, 354 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.22 BUY i
Availability2
Add to basket
MARC DownloadCite
cover
The law of electronic commerce
Comment Share
Davidson, Alan

Terdapat bibliografi dan indeks. Table of contents: 1. The law of electronic commerce 2 The rule of cyberspace 3. Electronic commerce and the law of contract 4. Shrinkwrap, Clickwrap and Browsewrap contracts 5. Electronic signatures 6. Copyright issues in electronic commerce 7 Electronic commerce? trade marks, patents and circuit layouts 8. Domain names 9. Domain name disputes 10. …

Edition
First edition
ISBN/ISSN
9780521678650
Collation
xxxvii, 399 hal.; ilus.; 23 cm
Series Title
--
Call Number
343 DAV l
Availability1
Add to basket
MARC DownloadCite
cover
Internet law: text and materials
Comment Share
Reed, Chris

Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…

Edition
Second Edition
ISBN/ISSN
9780521605229
Collation
xliv, 328hal.; ilus.; 23 cm
Series Title
Law in context
Call Number
343.41 REE i
Availability1
Add to basket
MARC DownloadCite
cover
Readings in cyberethics
Comment Share
Tavani, Herman TSpinello, Richard A

Table of contents: Ch. 1. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Ch. 2. Regulating the Net: Free Expression and Content Controls Ch. 3. Intellectual Property in Cuberspace Ch. 4. Privacy in Cyberspace Ch. 5. Security and Crime in Cyberspace Ch. 6. Professional Ethics, Codes of Conduct, and Computer/​Information Pro…

Edition
Second Edition
ISBN/ISSN
9780763724108
Collation
xviii, 697 hal.; ilus.; 23 cm
Series Title
--
Call Number
175 SPI r
Availability1
Add to basket
MARC DownloadCite
cover
The web application hacker’s handbook: finding and exploiting security flaws
Comment Share
Stuttard, DafyddPinto, Marcus

Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…

Edition
Second Edition
ISBN/ISSN
9781118026472
Collation
xxxiii, 878 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 STU w
Availability3
Add to basket
MARC DownloadCite
cover
Securing VoIP networks: threats, vulnerabilities, and countermeasures
Comment Share
Thermos, PeterTakanen, Ari

Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpri…

Edition
--
ISBN/ISSN
0321437349
Collation
xxiii, 359 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.695 THE s
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
cover
Handbook on securing cyber-physical critical infrastructure
Comment Share
Das, Sajal KumarKant, Krishna

Table of contents PART I. Theoretical Foundations Introduction Chapter 1. Security and Vulnerability of Cyber-Physical Infrastructure Networks 1.1 Introduction 1.2 Definitions for Security and Vulnerability of Network Dynamics 1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability 1.4 Conclusions and Future Work Chapter 2. Game Theory for Infrastruct…

Edition
1st edition
ISBN/ISSN
9780124158153
Collation
xxx, 817 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.8 DAS h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?