Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber law: aspek data privasi menurut hukum internasional, regional, dan nasi…
Comment Share
Sinta Dewi Rosadi

Buku ini ditulis dengan penuh pembaharuan, mengingat telah banyak perkembangan pengaturan hukum pelindungan data privasi baik secara internasional, regional maupun nasional. Rejim pengaturan data privasi telah berkembang dengan pesat baik di lingkup pemerintahan maupun swasta yang merupakan pihak yang memiliki kewajiban untuk dapat lebih melindungi data privasi individu, fenomena ini didorong d…

Edition
-
ISBN/ISSN
9786236232354
Collation
xii, 192 hlm.; ilus.; 24 cm
Series Title
-
Call Number
343 SIN c
Availability1
Add to basket
MARC DownloadCite
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
CCSP Certified Cloud Security Professional official practice tests: an ISC2 c…
Comment Share
Malisow, Ben

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by d…

Edition
Second Edition
ISBN/ISSN
9781119603498
Collation
xxv, 373 hlm; 23 cm
Series Title
-
Call Number
004.6782 MAL c
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi sistem multi Intrusion Detection System (IDS) dan algoritma Supp…
Comment Share
AmiruddinRaden Budiarto HadiprakosoDimas Febriyan PriambodoAchmad Husein Noor Faizi

Meningkatnya kejahatan dan serangan siber menjadikan keamanan jaringan sebagai prasyarat dasar bagi organisasi, tetapi organisasi tidak bisa menjamin hal tersebut karena penggunaan Intrusion Detection System (IDS) pada suatu organisasi masih menggunakan IDS bersensor tunggal, baik hanya berupa Host-Based IDS (HIDS) maupun hanya berupa Network-Based IDS (NIDS). Batasan ruang lingkup deteksi kedu…

Edition
--
ISBN/ISSN
--
Collation
xiv, 59 hlm.
Series Title
-
Call Number
2022 ACH i
Availability2
Add to basket
MARC DownloadCite
cover
The art of invisibility: the world's most famous hacker teaches you how to be…
Comment Share
Mitnick, KevinVamosi, Robert

Like it or not, your every move is being watched and analyzed. Consumer’s identities are being stolen, and a person’s every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge–an…

Edition
-
ISBN/ISSN
9780316380508
Collation
x, 320 hlm; 24 cm
Series Title
-
Call Number
005.1092 MIT t
Availability1
Add to basket
MARC DownloadCite
cover
Security, privacy and user interaction
Comment Share
Jakobsson, Markus

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how …

Edition
-
ISBN/ISSN
9783030437534
Collation
xv, 153 hlm.; 23 cm
Series Title
-
Call Number
005.8 JAK s
Availability1
Add to basket
MARC DownloadCite
cover
CyRM℠: mastering the management of cybersecurity (internal audit and IT audit)
Comment Share
Martin, David X

Table of Contents Introduction. Chapter 1. The Current Landscape. Prong 1: CyRM℠: Cyber Risk Management. Chapter 2. Gather Intelligence, Anticipate Risk. Chapter 3. Building a More Effective Cybersecurity Defense. Chapter 4. Align Critical Decision-Making for IT vs. Business. Chapter 5. Cybersecurity for Senior Executives and Board Members. Prong 2: CyberWellness℠. Chapter 6.…

Edition
-
ISBN/ISSN
9780367565312
Collation
viii, 138 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 MAR c
Availability1
Add to basket
MARC DownloadCite
cover
Cyberjutsu: cybersecurity for the modern ninja
Comment Share
McCarty, Ben

Table of Contents Chapter 1: Mapping Networks Chapter 2: Guarding with Special Care Chapter 3: Xenophobic Security Chapter 4: Identification Challenges Chapter 5: Double-Sealed Password Chapter 6: Hours of Infiltration Chapter 7: Access to Time Chapter 8: Tools Chapter 9: S

Edition
-
ISBN/ISSN
9781718500549
Collation
xxvii, 231 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 MCC c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity the essential body of knowledge
Comment Share
Conklin, Wm. ArthurShoemaker, Dan

1. Information Security is Important. 2. A Global Road Map for Security 3. Adapting Best Practice: Tailoring a Solution that Fits 4. Defining the Company's Executive Roles 5. Defining the Company's Functional Security Roles 6. Defining the Corollary Roles for Security 7. The Data Security Competency 8. The Digital Forensics Competency 9. The Enterprise Continuity Competency 10. The Inc…

Edition
--
ISBN/ISSN
9781435481695
Collation
xviv, 499 hal.; ilus.; 24cm.
Series Title
--
Call Number
005.8 SHO c
Availability3
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?