Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 6 7 8 9 10 Next Last Page
cover
The hacker's handbook: the strategy behind breaking into and defending networks
Comment Share
Young, SusanAitel, Dave

Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …

Edition
--
ISBN/ISSN
0849308887
Collation
xxxiv, 860 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 YOU h
Availability1
Add to basket
MARC DownloadCite
cover
Malware: fighting malicious code
Comment Share
Skoudis, EdZeltser, Lenny

Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion

Edition
1st edition
ISBN/ISSN
9780131014053
Collation
xxii, 647 hal.; ilus.; 23 cm
Series Title
Prentice Hall series in computer networking and distributed systems
Call Number
005.84 SKO m
Availability1
Add to basket
MARC DownloadCite
cover
Snort cookbook
Comment Share
Orebaugh, AngelaBiles, SimonBabbin, Jacob

Table of Contents Chapter 1 Installation and Optimization Introduction Installing Snort from Source on Unix Installing Snort Binaries on Linux Installing Snort on Solaris Installing Snort on Windows Uninstalling Snort from Windows Installing Snort on Mac OS X Uninstalling Snort from Linux Upgrading Snort on …

Edition
1st edition
ISBN/ISSN
0596007914
Collation
xiii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ORE s
Availability1
Add to basket
MARC DownloadCite
cover
Computer and information security handbook
Comment Share
Vacca, John R.

Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …

Edition
Second Edition
ISBN/ISSN
9780123943972
Collation
xxviii, 1171 hal.; ilus.; 29 cm
Series Title
--
Call Number
R005.8 VAC c
Availability1
Add to basket
MARC DownloadCite
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion analysis: methodologies, tools, and techniques for incident…
Comment Share
Fichera, JoeBolt, Steven

Table of Contents Chapter 1. Introduction Introducing Network Intrusion Analysis Chapter 2. Intrusion Methodologies and Artifacts Stage 1: Pre-Intrusion Actions: AKA Reconnaissance Stage 2: Intrusion Methods References Chapter 3. Incident Response Introduction Section 1: Methodology Trusted Toolset Commercial Triage Tools Section 2 Memory Acquisition Introduction Acquisition…

Edition
1st edition
ISBN/ISSN
9781597499620
Collation
xii, 239 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FIC n
Availability1
Add to basket
MARC DownloadCite
cover
Snort IDS and IPS toolkit
Comment Share
Baker, Andrew R.Esler, Joel

Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…

Edition
--
ISBN/ISSN
9781597490993
Collation
xxxiv, 729 hal.; ilus.; 25 cm
Series Title
Jay beale's open source security series
Call Number
005.8 BAK s
Availability2
Add to basket
MARC DownloadCite
cover
Network security auditing
Comment Share
Jackson, Chris

Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…

Edition
1st edition
ISBN/ISSN
9781587053528
Collation
xxiv, 488 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 JAC n
Availability1
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?