Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 194 from your keywords: subject="Computer Network"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Software security engineering: a guide for project managers
Comment Share
Allen, Julia H.

Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…

Edition
--
ISBN/ISSN
9780321509178
Collation
xxv, 334 hal.; ilus.; 24 cm
Series Title
The SEI series in software engineering
Call Number
005.8 ALL s
Availability1
Add to basket
MARC DownloadCite
cover
Practical intrusion analysis: prevention and detection for the twenty-first c…
Comment Share
Trost, Ryan

Table of Contents: 1. Network Overview 2. Infrastructure Monitoring 3. Intrusion Detection Systems 4. Lifecycle of a Vulnerability 5. Proactive Intrusion Prevention and Response via Attack Graphs 6. Network Flows and Anomaly Detection 7. Web Application Firewalls 8. Wireless IDS/IPS 9. Physical Intrusion Detection for IT 10. Geospatial Intrusion Detection 11. Visual Data Communicati…

Edition
--
ISBN/ISSN
9780321591807
Collation
xxiv, 455 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 TRO p
Availability2
Add to basket
MARC DownloadCite
cover
Nmap in the enterprise: your guide to network scanning
Comment Share
Orebaugh, Angela

Terdapat indeks. Table of contents: Chapter 1: Introducing Network Scanning Chapter 2: Introducing Nmap Chapter 3: Using Nmap Chapter 4: Fingerprinting with Nmap Chapter 5: Detection and Evasion with Nmap Chapter 6: Scanning in the Real World Chapter 7: Tooling Around with Nmap Chapter 7: Nmap scanning in the real world

Edition
1st edition
ISBN/ISSN
9781597492416
Collation
xiii, 245 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ORE n
Availability1
Add to basket
MARC DownloadCite
cover
Client-side attacks and defense
Comment Share
Shimonski, RobertOriyano, Sean-Philip

Terdapat indeks. Table of contents: Chapter 1. Client-Side Attacks Defined Client-Side Attacks: An Overview Types of Client-Side Attacks Chapter 2. Dissection of a Client-Side Attack What Constitutes a Client-Side Attack? Chapter 3. Protecting Web Browsers Common Functions of a Web Browser Microsoft Internet Explorer Mozilla Firefox Google Chrome Apple Safari Op…

Edition
--
ISBN/ISSN
9781597495905
Collation
xii, 278 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking web apps: detecting and preventing web application security problems
Comment Share
Shema, MikeAlcover, Jorge Blanco

Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…

Edition
--
ISBN/ISSN
9781597499514
Collation
xx, 273 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 SHE h
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Formal correctness of security protocols
Comment Share
Maurer, UeliBella, Giampaolo

Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…

Edition
--
ISBN/ISSN
9783540681342
Collation
xviii, 274 hlm.; 24 cm.
Series Title
--
Call Number
005.8 BEL f
Availability2
Add to basket
MARC DownloadCite
cover
Internet law: text and materials
Comment Share
Reed, Chris

Table of contents: Introduction 1. The Internet as a distributed environment 2. From each according to his ability: actors and activities in the Internet world 3. An infinity of scarce resources: ownership and use of Internet resources 4. New actors on a new stage: intermediary liability in the Internet world 5. On the Internet, nobody knows you're a dog: identity and identification 6.…

Edition
Second Edition
ISBN/ISSN
9780521605229
Collation
xliv, 328hal.; ilus.; 23 cm
Series Title
Law in context
Call Number
343.41 REE i
Availability1
Add to basket
MARC DownloadCite
cover
Readings in cyberethics
Comment Share
Tavani, Herman TSpinello, Richard A

Table of contents: Ch. 1. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Ch. 2. Regulating the Net: Free Expression and Content Controls Ch. 3. Intellectual Property in Cuberspace Ch. 4. Privacy in Cyberspace Ch. 5. Security and Crime in Cyberspace Ch. 6. Professional Ethics, Codes of Conduct, and Computer/​Information Pro…

Edition
Second Edition
ISBN/ISSN
9780763724108
Collation
xviii, 697 hal.; ilus.; 23 cm
Series Title
--
Call Number
175 SPI r
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?