Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 25 from your keywords: subject="Computer Software"
1 2 3 Next Last Page
cover
Cryptographic Libraries for Developers
Comment Share
Ed MoyleDiana Kelley

Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familia…

Edition
-
ISBN/ISSN
9781584504092
Collation
-
Series Title
programing series
Call Number
005.1 MOY c
Availability1
Add to basket
MARC DownloadCite
cover
Automatic malware analysis: an emulator based approach
Comment Share
Yin, HengSong, Dawn

Table of contents: 1. Introduction 2. Dynamic Binary Analysis Platform 3. Hidden Code Extraction 4. Privacy-breaching Behavior Analysis 5. Hooking Behavior Analysis 6. Analysis of trigger conditions and hidden behaviors 7. Concluding remarks

Edition
--
ISBN/ISSN
9781461455226
Collation
ix, 73 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 YIN a
Availability1
Add to basket
MARC DownloadCite
cover
Malware forensics field guide for Windows systems: digital forensics field gu…
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H.Rose, Curtis W.

Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…

Edition
--
ISBN/ISSN
9781597494724
Collation
xxxviii, 518 hal.; ilus.; 23cm
Series Title
--
Call Number
005.84 MAL m
Availability2
Add to basket
MARC DownloadCite
cover
Malware detection
Comment Share
Wang, CliffSong, DawnChristodorescu, MihaiJha, SomeshMaughan, Douglas

Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…

Edition
--
ISBN/ISSN
9781441940957
Collation
xi, 311 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.84 CHR m
Availability2
Add to basket
MARC DownloadCite
cover
CMMI for acquisition: guidelines for improving the acquisition of products an…
Comment Share
Shrum, SandyGallagher, Brian P.Philips, MikeRichter, Karen J.

Terdapat indeks. Table of Contents: Part One: About CMMI for Acquisition Chapter 1: Introduction Chapter 2: Process Area Components Chapter 3: Tying It All Together Chapter 4: Relationships Among Process Areas Chapter 5: Using CMMI Models Chapter 6: Essays on CMMI-ACQ in Government and Industry Part Two: Generic Goals and Generic Practices, and the Process Areas Part Three: The …

Edition
Second edition
ISBN/ISSN
9780321711519
Collation
xxi, 603 hal.; ilus.; 24 cm
Series Title
SEI series in software engineering
Call Number
005.1 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
CMMI for development: guidelines for process integration and product improvement
Comment Share
Chrissis, Mary BethKonrad, MikeShrum, Sandy

Table of Contents List of Perspectives xiii Preface xv Book Acknowledgments xxi Part One: About CMMI for Development 1 Chapter 1: Introduction 3 About Process Improvement 4 About Capability Maturity Models 9 Evolution of CMMI 10 CMMI Framework 14 CMMI for Development 18 Chapter 2: Process Area Components 19 Core Process Areas and CMMI Models 19 Required, Expected, and Info…

Edition
Third Edition
ISBN/ISSN
9780321711502
Collation
xxiv, 650 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHR c
Availability1
Add to basket
MARC DownloadCite
cover
Malware analyst's cookbook and DVD: tools and techniques for fighting malicio…
Comment Share
Ligh, Michael HaleAdair, StevenHartstein, BlakeRichard, Matthew

Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…

Edition
--
ISBN/ISSN
9780470613030
Collation
xxi, 716 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
005.84 LIG m
Availability1
Add to basket
MARC DownloadCite
cover
The rootkit arsenal: escape and evasion in the dark corners of the system
Comment Share
Blunden, Bill

Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…

Edition
1st edition
ISBN/ISSN
9781598220612
Collation
xxvii, 908 hal.; ilus;; 23 cm
Series Title
--
Call Number
005.8 BLU r
Availability1
Add to basket
MARC DownloadCite
cover
Malware: fighting malicious code
Comment Share
Skoudis, EdZeltser, Lenny

Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion

Edition
1st edition
ISBN/ISSN
9780131014053
Collation
xxii, 647 hal.; ilus.; 23 cm
Series Title
Prentice Hall series in computer networking and distributed systems
Call Number
005.84 SKO m
Availability1
Add to basket
MARC DownloadCite
cover
The art of computer virus research and defense
Comment Share
Szor, Peter

Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …

Edition
--
ISBN/ISSN
0321304543
Collation
xxvii, 713 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 SZO a
Availability1
Add to basket
MARC DownloadCite
1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?