Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 159 from your keywords: subject="security measures"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
Practical intrusion analysis: prevention and detection for the twenty-first c…
Comment Share
Trost, Ryan

Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…

Edition
--
ISBN/ISSN
9780321591807
Collation
xxiv, 455 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 TRO p
Availability2
Add to basket
MARC DownloadCite
cover
Nmap in the enterprise: your guide to network scanning
Comment Share
Orebaugh, Angela

Terdapat indeks. Table of contents: Chapter 1: Introducing Network Scanning Chapter 2: Introducing Nmap Chapter 3: Using Nmap Chapter 4: Fingerprinting with Nmap Chapter 5: Detection and Evasion with Nmap Chapter 6: Scanning in the Real World Chapter 7: Tooling Around with Nmap Chapter 7: Nmap scanning in the real world

Edition
1st edition
ISBN/ISSN
9781597492416
Collation
xiii, 245 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ORE n
Availability1
Add to basket
MARC DownloadCite
cover
Client-side attacks and defense
Comment Share
Shimonski, RobertOriyano, Sean-Philip

Terdapat indeks. Table of contents: Chapter 1. Client-Side Attacks Defined Client-Side Attacks: An Overview Types of Client-Side Attacks Chapter 2. Dissection of a Client-Side Attack What Constitutes a Client-Side Attack? Chapter 3. Protecting Web Browsers Common Functions of a Web Browser Microsoft Internet Explorer Mozilla Firefox Google Chrome Apple Safari Op…

Edition
--
ISBN/ISSN
9781597495905
Collation
xii, 278 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Formal correctness of security protocols
Comment Share
Maurer, UeliBella, Giampaolo

Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…

Edition
--
ISBN/ISSN
9783540681342
Collation
xviii, 274 hlm.; 24 cm.
Series Title
--
Call Number
005.8 BEL f
Availability2
Add to basket
MARC DownloadCite
cover
Mastering Windows network forensics and investigation
Comment Share
Anson, SteveBunting, SteveJohnson, RyanPearson, Scott

Table of contents Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Chapter 2 The Microsoft Network Structure 25 Chapter 3 Beyond the Windows GUI 63 Chapter 4 Windows Password Issues 85 Chapter 5 Windows Ports and Services 137 Part 2 Analyzing the Computer 157 Chapter 6 Live-Analysis Techniques 159 Chapter 7 Windows Filesystems 179 C…

Edition
Second Edition
ISBN/ISSN
9781118163825
Collation
xxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 ANS m
Availability1
Add to basket
MARC DownloadCite
cover
Nmap cookbook: the fat-free guide to network scanning
Comment Share
Marsh, Nicholas

Table of contents: Section 1 Installing Nmap Section 2 Basic Scanning Techniques Section 3 Discovery Options Section 4 Advanced Scanning Options Section 5 Port Scanning Options Section 6 Operating System and Service Detection Section 7 Timing Options Section 8 Evading Firewalls Section 9 Output Options Section 10 Troubleshooting and Debugging Section 11 Ze…

Edition
--
ISBN/ISSN
1449902529
Collation
196 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MAR n
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?