Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 192 from your keywords: subject="Computer Network"
1 2 3 4 5 Next Last Page
cover
Internet TCP/IP: konsep dan implementasi
Comment Share
Onno W. Purbo

Buku ini menjelaskan tentang bagaimana membangun dinding pertahanan keamanan websiteyang baik. Juga dilengkapi dengan penjelasan tentang aplikasi, metode, dan penerapan konsepperetasan. Secara tak langsung, buku ini ibarat meminta pembaca (web developer dan pentester)untuk berpikir sebagai peretas atau penyerang. Daftar Isi Bab 1. Pendahuluan A. TCP/IP dan internet B. Standar TCP/IP dan p…

Edition
Ed. I
ISBN/ISSN
9789792961935
Collation
xviii, 427 hal.; ilus.; 23 cm
Series Title
--
Call Number
004.65 ONN i
Availability3
Add to basket
MARC DownloadCite
cover
Computer Network Security Theory and Practice
Comment Share
Jie Wang

Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT profession…

Edition
1038 running number
ISBN/ISSN
9787040241624
Collation
xviii, 384 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 WAN c
Availability1
Add to basket
MARC DownloadCite
cover
Jaringan komputer dengan TCP/IP: membahas konsep dan teknik implementasi TCP/…
Comment Share
Winarno SugengTheta Dinnarwaty Putri

Daftar isi: 1. Konsep dasar jaringan komputer 2. Standar, proses, dan sejarah 3. Konsep dasar protokol 4. Pengalamatan internet protokol 5. DNS (Domain Name System) 6. Routing 7. Web & mail server 8. Implementasi DNS 9. Implementasi routing IPv4 RedHat 10. Implementasi routing IPv4 Ubuntu 11. Implementasi routing IPv6 12. Implementasi MikroTIK RouterOS 13. Implementasi m…

Edition
Edisi revisi
ISBN/ISSN
9786028759410
Collation
xx, 330 hal.; ilus.; 23 cm
Series Title
--
Call Number
004.65 WIN j2
Availability4
Add to basket
MARC DownloadCite
cover
Cryptography and Network Security
Comment Share
Behrouz A. Forouzan

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c
Availability1
Add to basket
MARC DownloadCite
cover
Konsep & penerapan Microsoft TCP/IP second edition
Comment Share
Heywood, DrewDaniel M.W

Edition
-
ISBN/ISSN
9797631796
Collation
xiv, 490 hal: 23 cm
Series Title
-
Call Number
004.62 HEY k

Edition
-
ISBN/ISSN
9797631796
Collation
xiv, 490 hal: 23 cm
Series Title
-
Call Number
004.62 HEY k
Availability1
Add to basket
MARC DownloadCite
cover
Real world cryptography
Comment Share
Wong, David

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…

Edition
-
ISBN/ISSN
9781638350842
Collation
xxv, 370 hlm :23 cm
Series Title
--
Call Number
005.82 WON r
Availability2
Add to basket
MARC DownloadCite
cover
Applied Incident Response
Comment Share
Anson, Steve

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…

Edition
-
ISBN/ISSN
9781119560289
Collation
446 hal
Series Title
-
Call Number
004.65 ANS a
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Education : Principles and Policies
Comment Share
Austin, Greg

"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of …

Edition
-
ISBN/ISSN
9780367822576
Collation
xx, 225 hal : 23cm
Series Title
-
Call Number
005.8071
Availability1
Add to basket
MARC DownloadCite
cover
Schneier on Security
Comment Share
Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…

Edition
-
ISBN/ISSN
9780470395356
Collation
328hal
Series Title
-
Call Number
005.80973 SCH s
Availability2
Add to basket
MARC DownloadCite
cover
ISO/IEC 27000 -- Information technology -- security techniques -- Information…
Comment Share
ISO/IEC

Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …

Edition
Fifth edition
ISBN/ISSN
--
Collation
v, 27 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?