Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 159 from your keywords: subject="security measures"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, Steve

TABLE OF CONTENTS Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows F…

Edition
First edition
ISBN/ISSN
9780470097625
Collation
xxii, 530 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m2
Availability1
Add to basket
MARC DownloadCite
cover
Windows forensic analysis DVD toolkit
Comment Share
Casey, EoghanCarvey, Harlan A.

Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget

Edition
Second edition
ISBN/ISSN
9781597494229
Collation
xxiv, 482 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
363.25 CAR w
Availability1
Add to basket
MARC DownloadCite
cover
Securing the cloud: cloud computer security techniques and tactics
Comment Share
Winkler, Vic J.R.

Contents CHAPTER 1 Introduction to Cloud Computing and Security 1 Understanding Cloud Computing 1 Cloud Scale, Patterns, and Operational Efficiency 2 A Synergistic Trick 3 Elasticity, Shape Shifting, and Security 3 The IT Foundation for Cloud 4 Cloud Computing as Foundation for Cloud Services 5 Cloud Computing Qualities 7 The Bottom Line 8 An Historical View: Roots of Cloud Comp…

Edition
--
ISBN/ISSN
9781597495929
Collation
xxiv, 290 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.6782 WIN s
Availability2
Add to basket
MARC DownloadCite
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Professional penetration testing: creating and operating a formal hacking lab
Comment Share
Wilhelm, Thomas

Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…

Edition
1st edition
ISBN/ISSN
9781597494250
Collation
xix, 504 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 WIL p
Availability1
Add to basket
MARC DownloadCite
cover
The computer incident response planning handbook: executable plans for protec…
Comment Share
McCarthy, N. K.

Table of contents: Part 1: The Threat Landscape Ch 1 Introduction to Planning & Crisis Ch 2 The Nebulous Standard of Cyber Due Diligence & The New Era of Information Risk Part 2: Planning for Crisis Ch 3 A Plan is Preparation Manifested Ch 4 Writing Your Computer Incident Response Plan Part 3: Plan Development - Data Breach Ch 5 Your Data Breach CIRP - Incident Preparation Ch 6 D…

Edition
--
ISBN/ISSN
9780071790390
Collation
xxviii, 209 hal.; ilus.; 23 cm
Series Title
--
Call Number
R005.8 McC c
Availability1
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
The CERT guide to system and network security practices
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: 1. The Handbook of System and Network Security Practices. I. SECURING COMPUTERS. 2. Securing Network Servers and User Workstations. 3. Securing Public Web Servers. 4. Deploying Firewalls. II. INTRUSION DETECTION AND RESPONSE. 5. Setting Up Intrusion Detection and Response Practices. 6. Detecting Signs of Intrusion. 7. Respondin…

Edition
--
ISBN/ISSN
020173723x
Collation
xxiv, 447 hal.; ilus; 24 cm
Series Title
SEI Series in Software Engineering
Call Number
005.8 ALL c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?