Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 469 from your keywords: subject="Security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Page Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Internet access services for employees 7.1 Background 7.2 Security threats 7.3 Security design techniques and controls 8 Business to business services 8.1 Background 8.2 Security threats 8.3 Security design techniques and controls 9 Business to customer s…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 30 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 9 Security controls 9.1 Overview 9.2 Stateless packet filtering 9.3 Stateful packet inspection 9.4 Application firewall 9.5 Content filtering 9.6 Intrusion prevention system and intrusion detection system 9.7 Security m…

Edition
First edition
ISBN/ISSN
--
Collation
v, 22 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents : Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 6.1 Introduction 6.2 Types of VPNs 7 Security Threats 8 Security Requirements 8.1 Overview 8.2 Confidentiality 8.3 Integrity 8.4 Authenticity 8.5 Authorization 8.6 Availability 8.7 Tunnel Endpoint Security 9 Security Controls 9.1 Securit…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 14 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27004 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography

Edition
Second edition
ISBN/ISSN
--
Collation
v, 58 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Preparing for design of network security 6.1 Introduction 6.2 Asset identification 6.3 Requirements collection 6.3.1 Legal and regulatory requirements 6.3.2 Business requirements 6.3.3 Performance requirements 6.4 Review requirements 6.5 Review of existing designs and i…

Edition
First edition corrected version
ISBN/ISSN
--
Collation
v, 28 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27001 -- Information technology -- security techniques -- Informatio…
Comment Share
ISO/IEC

Contents : Foreword 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the information security management system 4.4 Information security management system 5 Leadership 5.1 Leadership…

Edition
Second edition
ISBN/ISSN
--
Collation
v, 23 cm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1. Scope 2. Normative reference 3. Terms and definitions 4. Symbols and abbreviated terms 5. Structure 6. Overview 6.1 Background 6.2 Networks security planning 7. Identifying risk and preparing to identify security controls 7.1 Introduction 7.2 Information on current and/or planned networking 7.2.1 Security requirements in corporate information secu…

Edition
Second edition
ISBN/ISSN
-
Collation
viii, 48 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
Dasar cyber security dan forensic
Comment Share
Hanafi

Buku ini terdiri atas dua hal pokok, pertama yaitu cybersecurity yang fokus untuk mempelajari berbagai jenis ancaman yang sering terjadi di dunia cyber, teknik yang digunakan untuk melakukan serangan dan tentunya strategi untuk menghindarinya. Dalam buku ini juga penulis sampaikan berbagai tools dan aplikasi yang sering digunakan oleh penyerang menyangkut berbagai aspek dan media seperti serang…

Edition
Cet. I
ISBN/ISSN
9786230254314
Collation
xx, 236 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8
Availability1
Add to basket
MARC DownloadCite
cover
Penetration testing: a hands-on guide for beginners
Comment Share
Wallace, Connor

This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or hacking. It will cover all the details completely from start to end. You will learn …

Edition
--
ISBN/ISSN
9798614981143
Collation
viii, 185 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WAL p
Availability1
Add to basket
MARC DownloadCite
cover
Information security science: measuring the vulnerability to data compromises
Comment Share
Young, Carl S.

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explo…

Edition
--
ISBN/ISSN
9780128096437
Collation
xx, 385 hm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 YOU i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?