Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Tribe of hackers blue team
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing cos…

Edition
-
ISBN/ISSN
9781119643418
Collation
xvi, 346 hlm; 22,5 cm
Series Title
-
Call Number
005.1092 CAR t
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Beginning ethical hacking with kali linux: computational techniques for resol…
Comment Share
Sinha, Sanjib

The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosyst…

Edition
-
ISBN/ISSN
9781484238905
Collation
xx, 417 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.84 SIN b
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security practitioner's guide
Comment Share
Jahankhani, Hamid

In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the m…

Edition
-
ISBN/ISSN
9789811204456
Collation
xxxiv, 562 hlm; 23 cm
Series Title
-
Call Number
005.8 JAH c
Availability1
Add to basket
MARC DownloadCite
cover
How to measure anything in cybersecurity risk
Comment Share
Hubbard, Douglas WSeiersen, Richard

How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his best-selling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise…

Edition
-
ISBN/ISSN
9781119085294
Collation
xv, 280 hlm; 23 cm
Series Title
-
Call Number
005.8 HUB h
Availability1
Add to basket
MARC DownloadCite
cover
Comptia security + guide to network security fundamentals (MindTap Course List)
Comment Share
Ciampa, Mark

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…

Edition
7th ed
ISBN/ISSN
9780357424377
Collation
xviii, 558 hlm.; ilus.; 27,5 cm
Series Title
-
Call Number
005.8 CIA c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
cover
Click here to kill everybody: security and survival in a hyper-connected world
Comment Share
Schneier, Bruce

Table of Contents Introduction: Everything is Becoming a Computer Part 1: The Trends 1. Computers Are Still Hard to Secure 2. Patching Is Failing as a Security Paradigm 3. Knowing Who’s Who on the Internet Is Getting Harder 4. Everyone Favors Insecurity 5. Risks are Becoming Catastrophic Part 2: The Solutions 6. What a Secure Internet+ Looks Like 7. How We Can Secure the Interne…

Edition
-
ISBN/ISSN
9780393608885
Collation
viii, 319 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
Komputer forensik: melacak kejahatan digital
Comment Share
Feri Sulianta

Daftar isi: BAB 1 Komputer forensik BAB 2 Perangkat komputer forensik BAB 3 Metode komputer forensik BAB 4 Standardisasi komputer forensik BAB 5 Skill investigasi BAB 6 Bedah komputer forensik BAB 7 Training dan departemen komputer forensik BAB 8 Perbendaharaan komputer forensik

Edition
Ed. 1
ISBN/ISSN
9789792952971
Collation
viii, 280 hal.; ilus.; 21 cm
Series Title
-
Call Number
005.8 FER k
Availability4
Add to basket
MARC DownloadCite
cover
Versatile cybersecurity
Comment Share
Conti, Mauro

Edition
-
ISBN/ISSN
9783319976426
Collation
-
Series Title
Advances in Information Security
Call Number
005.8 CON v

Edition
-
ISBN/ISSN
9783319976426
Collation
-
Series Title
Advances in Information Security
Call Number
005.8 CON v
Availability2
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?