Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 54 from your keywords: subject="Komputer -- Pengamana...
First Page Previous 1 2 3 4 5 Next Last Page
cover
Information security governace simplified: from the boardroom to the keyboard
Comment Share
Fitzgerald, Todd

Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…

Edition
--
ISBN/ISSN
9781439811634
Collation
xxviii, 383 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8068 FIT i
Availability2
Add to basket
MARC DownloadCite
cover
Hacking internet banking
Comment Share
Aat Shadewa

Daftar isi: 1. All about internet banking dkk (semua tentang internet babking dan kawan-kawannya 2. PIN dan kartu kredit pasangan yang pas 3. Menelusuri sistem internet banking 4. SQL injection onleh!!! KubiS (KUpas Abis) SQL injection 5. Bab yang cidak ada jwudwul

Edition
Edisi I
ISBN/ISSN
9789792571844
Collation
xvi, 167 hlm.; ilus.; 21 cm.
Series Title
--
Call Number
005.84 AAT h
Availability1
Add to basket
MARC DownloadCite
cover
Pedoman praktis keamanan informasi untuk pengguna rumah & individu: 9 rekomen…
Comment Share
Juliati Junde

Daftar isi: Pendahuluan Sembilan hal penting untuk diketahui Langkah 1: Pasang dan gunakan program anti-virus Langkah 2: Lakukan patch pada sistem anda Langkah 3: Hati-hati dalam membaca email dengan attachment Langkah 4: Pasang dan gunakan program firewall Langkah 5: Lakukan backups untuk file dan folder penting Langkah 6: Gunakan password yang kuat Langkah 7: Hati-hati ketika downl…

Edition
Cetakan keempat
ISBN/ISSN
--
Collation
v, 42 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 JUL p
Availability1
Add to basket
MARC DownloadCite
cover
The basics of information security: understanding the fundamentals of infosec…
Comment Share
Andress, Jason

Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…

Edition
Second Edition
ISBN/ISSN
9780128007440
Collation
xxi, 217 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND b
Availability1
Add to basket
MARC DownloadCite
cover
IT security metrics: a practical framework for measuring security dan protect…
Comment Share
Hayden, Lance

Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…

Edition
--
ISBN/ISSN
9780071713412
Collation
xxvii, 368 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 HAY i
Availability1
Add to basket
MARC DownloadCite
cover
Step by step teknik hacking
Comment Share
Java Creativity

Daftar isi: 1. Welcome 2. Disable anti virus 3. Men-disable AVG 2014 4. Men-disable anti virus avira 5. Men-disable smadav 2014 6. Run as administrator 7. Kenalan dulu dengan IP address 8. Cara lain melihat IP dynamic 9. Kenalan juga dengan mac address 10. Scan lp dengan advanced IP scanner 11. Scan Ip dengan angry IP scanner 12. Cara mudah scan mac address 13. Mengintip password…

Edition
--
ISBN/ISSN
9786020248073
Collation
xiv, 294 hal.; ilus.; 21 cm. + 1 CD
Series Title
--
Call Number
005.84 JAV s
Availability1
Add to basket
MARC DownloadCite
cover
Hacking dengan keylogger
Comment Share
Dedik KurniawanJava Creativity

Daftar isi: BAB 1 Pendahuluan 1.1 Keylogger software vs. hardware 1.2 Tujuan memasang keylogger 1.3 Bagaimana keylogger dipasang BAB 2 Free keylogger 2.1 Free keylogger by iwansoft 2.2 Danusoft free keylogger 2.3 Family keylogger free 2.4 Home keylogger 2.5 Real free keylogger 2.6 Revealer keylogger free BAB 3 Trial keylogger 3.1 All in one keylogger 3.2 Soft activity keylog…

Edition
--
ISBN/ISSN
9786020290348
Collation
x, 238 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 DED h
Availability1
Add to basket
MARC DownloadCite
cover
Kung-Fu hacking dengan Nmap
Comment Share
Abdullah

Daftar isi: BAB 1 Mengenal NMAP BAB 2 Network scanning BAB 3 Information gathering BAB 4 Web server scanning BAB 5 Mail server scanning BAB 6 Advanced scanning BAB 7 Membuat laporan

Edition
Ed. 1
ISBN/ISSN
9789792952667
Collation
viii, 180 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 ABD k
Availability0
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
SQL injection: jurus menembus keamanan situs web paling berbahaya
Comment Share
Efvy Zam

Daftar Isi Kata Pengantar vii Daftar Isi ix 1. BAB I MEMPERSIAPKAN INFRASTRUKTUR 1 2. BAB 2 BERKENALAN DENGAN SQL 15 2.1. Menggunakan phpMyAdmin / 21 2.1.1. Membuat Database / 22 2.1.2. Membuat Tabel / 22 2.1.3. Memasukkan Data / 24 2.1.4. Melihat isi label / 26 2.1.5. Export & Import Database / 28 2.1.6. Menghapus Tabel / 34 2.2. Menggunakan SQL dalam phpMyAdmin / 35 2.2.1. M…

Edition
-
ISBN/ISSN
9786020033259
Collation
xiii, 353 hlm.; ilus.; 21 cm.
Series Title
-
Call Number
004.74 EFV i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?