Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 13 from your keywords: subject="Computer Hackers"
1 2 Next Last Page
cover
Ethical hacker menjadi peretas yang beretika
Comment Share
Azis Kurniawan

“Tidak ada teknologi dan sistem informasi yang benar-benar aman”. Itulah hal yang disampaikan buku ini. Secanggih apapun, semahal apapun, bahkan sekuat apapun sistem yang dibuat dan diimplementasikan dalam pengamanan TI, akan selalu dapat ditembus, hanya masalah waktu saja. Buku ini menggambarkan bagaimana dunia siber itu penuh dengan ancaman yang berbahaya. Penulis menyajikan materi yang…

Edition
Cet. I
ISBN/ISSN
9786235507965
Collation
xii, 88 hlm.; ilus.; 20 cm
Series Title
--
Call Number
005.1092 AZI e
Availability1
Add to basket
MARC DownloadCite
cover
Hacker & keamanan
Comment Share
Sitorus, Eryanto

Kehadiran para hacker dalam sistem jaringan komputer telah membuat banyak orang menjadi super panik,khawatir,dan takut. Mereka takut data-data penting yang ada di dalam hard disk disabot oleh orang-orang yang tidak bertangungjawab. Mereka juga merasa kawatir setiap kali akan mengetik kata sandi(pasword). Lebuh parah lagi, mereka (para pengguna internet) menjadi gelisah, karena yamg yang namanya…

Edition
--
ISBN/ISSN
9797315819
Collation
vi, 268 hlm.; ilus.
Series Title
--
Call Number
005.8 SIT h
Availability2
Add to basket
MARC DownloadCite
cover
The art of invisibility: the world's most famous hacker teaches you how to be…
Comment Share
Mitnick, KevinVamosi, Robert

Like it or not, your every move is being watched and analyzed. Consumer’s identities are being stolen, and a person’s every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge–an…

Edition
-
ISBN/ISSN
9780316380508
Collation
x, 320 hlm; 24 cm
Series Title
-
Call Number
005.1092 MIT t
Availability1
Add to basket
MARC DownloadCite
cover
Hunting cyber criminals: a hacker's guide to online intelligence gathering to…
Comment Share
Troia, Vinny

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h
Availability1
Add to basket
MARC DownloadCite
cover
Professional penetration testing: creating and operating a formal hacking lab
Comment Share
Wilhelm, Thomas

Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…

Edition
1st edition
ISBN/ISSN
9781597494250
Collation
xix, 504 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 WIL p
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Harris, ShonEagle, ChrisHarper, AllenNess, JonathanLenkey, GideonWilliams, Terron

Terdapat indeks. Table of Contents: Part I Introduction to Ethical Disclosure Chapter 1 Ethics of Ethical Hacking Chapter 2 Ethical Hacking and the Legal System Chapter 3 Proper and Ethical Disclosure Part II Penetration Testing and Tools Chapter 4 Social Engineering Attacks Chapter 5 Physical Penetration Attacks Chapter 6 Insider Attacks Chapter 7 Using the BackTrack Linux Dist…

Edition
Third editon
ISBN/ISSN
9780071742559
Collation
xxiv, 693 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
CEH (Certified Ethical Hacker) : 500% illegal
Comment Share
Jonny Hidayat

Daftar isi: Bagian 1 Denial of service Apa itu denial of service attack Apa itu distributed denial of service attack Teknik serangan DoS dan DDoS Botnet Tools DoS Mendeteksi serangan DoS Strategi untuk mengatasi DoS Teknik-teknik melawan botnet Langkah-langkah mencegah DoS/DDoS Proteksi DoS/DDoS di level ISP Mengaktifkan TCP intercept pada IOS cisco Perangkat keras untuk perlind…

Edition
--
ISBN/ISSN
9789791090865
Collation
viii, 252 hal.: ilus.; 21 cm
Series Title
--
Call Number
005.84 JON c
Availability1
Add to basket
MARC DownloadCite
cover
Security jaringan komputer berbasis CEH
Comment Share
Rifkie Primartha

Daftar Isi Bab 1. Pendahuluan security Maksud dan tujuan 1.1. Apakah security? 1.2. Makhluk apakah CEH? 1.3. Apakah komputer security itu? 1.4. Computer vs information security 1.5. Network security Bab 2. Serba-serbi CEH Maksud dan tujuan 2.1. Jaringan komputer 2.2. Training CEH 2.3. Apa yang dibutuhkan? 2.4. Materi CEH 2.5. Soal ujian CEH Bab 3. Pendahuluan ethical hackin…

Edition
--
ISBN/ISSN
9786026232571
Collation
viii, 286 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.84 RIF s
Availability3
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 100 % illegal
Comment Share
S'to

Daftar isi: Module 1. Pemahaman dasar ethical hacker Kenapa keamanan computer menjadi penting Terminologi-terminologi dasar Element-element keamanan Tahapan aktifitas hacking Pengelompokan jenis serangan Hacktivistm Ethical hacking atau hacking beretika Vulnerability research dan tools Bagaimana ethical hacker bekerja Jenis testing Metodologi testing Module 2. Footprinting Men…

Edition
Cetakan kedua
ISBN/ISSN
9789791090216
Collation
viii, 200 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c
Availability1
Add to basket
MARC DownloadCite
cover
CEH (certified ethical hacker): 200 % illegal
Comment Share
S'to

Daftar isi: MODULE 6: ENUMERATION BAB 1 Enumeration Enumeration Null sessions Enumerasi active directory MODULE 7: SYSTEM HACKING BAB 2 Password cracking Active online attacks Passive online attacks Offline attacks Non electronic attacks BAB 3 Escalating privileges BAB 4 Executing application, keylogger & spyware Executing appli…

Edition
Cetakan kedua
ISBN/ISSN
9789791090278
Collation
vi, 202 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 STO c2
Availability0
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?