Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 56 57 58 59 60 Next Last Page
cover
CCNA data center DCICT 640-916 official cert guide
Comment Share
Shamsee, NavaidKlebanov, DavidFayed, HeshamKarakok, Ozden

Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…

Edition
--
ISBN/ISSN
9781587144226
Collation
lv, 1004 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 SHA c
Availability1
Add to basket
MARC DownloadCite
cover
Virtualization and forensics: a digital forensic investigator's guide to virt…
Comment Share
Barret, DianeKipper, Gregory

Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…

Edition
--
ISBN/ISSN
9781597495578
Collation
xvii, 253 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAR v
Availability1
Add to basket
MARC DownloadCite
cover
Distributed and cloud computing: from parallel processing to the internet of …
Comment Share
Hwang, KaiFox, Geoffrey C.Dongarra, Jack J.

Table of contents: 1. Distributed system models and enabling technologies 2. Computer clusters for scalable parallel computing 3. Virtual machines and virtualization of clusters and data centers 4. Cloud platform architecture over virtualized data centers 5. Service-oriented architectures for distributed computing 6. Cloud programming and software environments 7. Grid computing systems a…

Edition
--
ISBN/ISSN
9780123858801
Collation
xiii, 648 hal.; ilus.; 23 cm
Series Title
--
Call Number
004.678 HWA d
Availability1
Add to basket
MARC DownloadCite
cover
Network forensics: tracking hackers through cyberspace
Comment Share
Davidoff, SherriHam, Jonathan

Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…

Edition
--
ISBN/ISSN
9780132564717
Collation
xxvi, 545 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV n
Availability1
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
CWSP certified wireless security professional study guide
Comment Share
Coleman, David D.Westcott, David AHarkins, Bryan

Table of contents: Chapter 1 WLAN Security Overview 1 Chapter 2 Legacy 802.11 Security 29 Chapter 3 Encryption Ciphers and Methods 61 Chapter 4 802.1X/EAP Authentication 87 Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151 Chapter 6 PSK Authentication 193 Chapter 7 802.11 Fast Secure Roaming 215 Chapter 8 WLAN Security Infrastructure 257 Chapter 9 RADIUS and LDAP 291 Chap…

Edition
Second Edition
ISBN/ISSN
9781119211082
Collation
xlvii, 645 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
Database security
Comment Share
Basta, AlfredZgola, Melissa

Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

Edition
--
ISBN/ISSN
9781435453906
Collation
x, 299 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BAS d
Availability1
Add to basket
MARC DownloadCite
cover
COBIT 5 for assurance
Comment Share
ISACA

Created with today’s increasingly complex business and technology landscape in mind, COBIT 5 for Assurance can be used for many different purposes including: - Obtaining a view (based on COBIT 5 concepts such as the enablers) on current good practices on assurance - Learning how to use different COBIT 5 components and related concepts for planning, scoping, executing and reporting on vari…

Edition
--
ISBN/ISSN
9781604203394
Collation
318 hal.; ilus.; 30 cm
Series Title
--
Call Number
658.4038 ISA c
Availability1
Add to basket
MARC DownloadCite
cover
Computer incident response and forensics team management: conducting a succes…
Comment Share
Jhonson III, Leighton R.

Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…

Edition
--
ISBN/ISSN
9781597499965
Collation
xiii, 333 hal.; ilus.; 24cm
Series Title
--
Call Number
658.4 JOH c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 56 57 58 59 60 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?