Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 194 from your keywords: subject="Computer Network"
First Page Previous 6 7 8 9 10 Next Last Page
cover
CISSP all-in-one exam guide
Comment Share
Harris, ShonMaymi, Fernando

null

Edition
Seventh Edition
ISBN/ISSN
9780071849616
Collation
xxxiv, 1341 hlm.: ilus.; 24 cm + 1 CD
Series Title
-
Call Number
005.8 HAR c
Availability1
Add to basket
MARC DownloadCite
cover
Code and other laws of cyberspace
Comment Share
Lessig, Lawrence

Terdapat bibliografi dan indeks. Table of contents: Ch. 1. Code is law Ch. 2. Four puzzles from cyberspace Ch. 3. Is-ism : is the way it is the way it must be? Ch. 4. Architectures of control Ch. 5. Regulating code Ch. 6. Cyberspaces Ch. 7. What things regulate Ch. 8. The limits in open code Ch. 9. Translation Ch. 10. Intellectual property Ch. 11. Privacy Ch. 12. Free speech Ch.…

Edition
Second edition
ISBN/ISSN
9780465039142
Collation
xvii, 410 hal.; 24 cm
Series Title
--
Call Number
343 LES c2
Availability1
Add to basket
MARC DownloadCite
cover
Code and other laws of cyberspace
Comment Share
Lessig, Lawrence

Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…

Edition
First edition
ISBN/ISSN
0465039138
Collation
xii, 297 hal 25 cm
Series Title
--
Call Number
343 LES c
Availability1
Add to basket
MARC DownloadCite
cover
Malware detection
Comment Share
Wang, CliffSong, DawnChristodorescu, MihaiJha, SomeshMaughan, Douglas

Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…

Edition
--
ISBN/ISSN
9781441940957
Collation
xi, 311 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.84 CHR m
Availability2
Add to basket
MARC DownloadCite
cover
Law in cyber space
Comment Share
Commonwealth Secretariat

A. Background B. Report of the Expert Working Group on Legal Aspects of Information Technology and the Related Law of Evidence (London 26-30 June 2000) Pt. 1. Additions/​Changes to UNCITRAL Model Law. 1. Issues arising from Chapter I of Model Law. 2. Issues arising from Chapter II of UNCITRAL Model Law. 3. Issues arising out of Chapter III of the UNCITRAL Model Law. 4. Issues …

Edition
--
ISBN/ISSN
0850926580
Collation
142 hal.; 22 cm
Series Title
--
Call Number
343 COM l
Availability1
Add to basket
MARC DownloadCite
cover
Intrution detection system to detect web anomalies: a novel approach to perfo…
Comment Share
Anandh, Sumi

Table of contents: 1. Introduction Basic of intrusions and intrusion detection Introduction of intrusion detection systems Introduction to anomalies and signatures Anomaly detection systems Intrusion detection technology Techniques for intrusion detection 2. Literature study Intrusion detection systems Intrusion - Attackers and the attecked Dimensions of intrusion …

Edition
--
ISBN/ISSN
9783846596883
Collation
ix, 78 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.8 ANA i
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection and correlation: challenges and solutions
Comment Share
Kruegel, ChristopherValeur, FredrikVigna, Giovanni

Terdapat bibliografi dan indeks. Table of contents: 1. Introduction 2. Computer security and intrusion detection 3. Alert correlation 4. Alert collection 5. Alert aggregation and verification 6. High-level alert structures 7. Large-scale correlation 8. Evaluation 9. Open issues 10. Conclusions.

Edition
--
ISBN/ISSN
9781441936240
Collation
xiv, 118 hal.; ilus.; 24 cm
Series Title
Advances in information security
Call Number
005.8 KRU i
Availability1
Add to basket
MARC DownloadCite
cover
Inside network perimeter security
Comment Share
Northcutt, StephenZeltser, LennyWinters, ScottKent, KarenRitchey, Ronald W.

Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…

Edition
Second edition
ISBN/ISSN
0672327376
Collation
xxxii, 734 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR i
Availability2
Add to basket
MARC DownloadCite
cover
Security monitoring
Comment Share
Fry, ChrisNystrom, Martin

Terdapat indeks. Table of Contents: 1. Getting Started 2. Implement Policies for Monitoring 3. Know Your Network 4. Select Targets for Monitoring 5. Choose Event Sources 6. Feed and Tune 7. Maintain Dependable Event Sources 8. Conclusion: Keeping It Real

Edition
First edition
ISBN/ISSN
9780596518165
Collation
xv, 227 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 FRY s
Availability1
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?