Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 8 from your keywords: subject="Computer hacking"
cover
Ilmu hacking
Comment Share
Dedik Kurniawan

Ilmu hacking merupakan ilmu yang mengajarkan berbagai cara yang biasanya digunakan hacker untuk memasuki sistem orang lain, mendapatkan password, melakukan penyadapan, dan lainnya. Tujuan buku ini ditulis bukan mengajari menjadi hacker ilegal dan tidak bertanggung jawab, akan tetapi agar Anda bisa bertahan dari serangan hacker dan agar tidak menjadi korban hacking. Dengan mempelajari buku ini, …

Edition
Cet. I
ISBN/ISSN
9786230046537
Collation
x, 404 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.84 DED i
Availability1
Add to basket
MARC DownloadCite
cover
Cepat belajar hacking: mulai dari pengenalan sampai praktik hingga pencegahannya
Comment Share
Adelphia

Buku cepat belajar hacking mengikuti peran teknologi dimana semaking berkembang sangat pesat sehingga beberapa programmer hebat yang banyak membuat aplikasi baru, membangun jaringan, menciptakan software terbaru setiap hari. Namun tahukan Anda, setiap aplikasi atau jaringan mempunyai celah untuk ditembus? Tidak ada sistem yang aman. Itu adalah semboyan yang ditanamkan para hacker yang berkecimp…

Edition
Pertama
ISBN/ISSN
9786020280202
Collation
ix, 113 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.1092 ADE c
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…

Edition
-
ISBN/ISSN
9781803248745
Collation
816 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Cult of the dead cow: how the original hacking supergroup might just save the…
Comment Share
Menn, Joseph

Table of Contents Author's Note ix The Players xi Chapter 1 An Evening in San Francisco 1 Chapter 2 Texas T-Files 9 Chapter 3 The Cons 21 Chapter 4 Underground Boston 37 Chapter 5 Back Orifice 53 Chapter 6 One Million Dollars and a Monster Truck 71 Chapter 7 Oxblood 85 Chapter 8 Much @stake 107 Chapter 9 Tor and Citizen Lab 127 Chapter 10 Jake 139 Chapter 11 Mixter, Muench, and…

Edition
-
ISBN/ISSN
9781541762367
Collation
xi, 253 hlm.; ilus.; 20,5 cm
Series Title
-
Call Number
005.84 MEN c
Availability1
Add to basket
MARC DownloadCite
cover
Hacking multifactor authentication
Comment Share
Grimes, Roger A.

TABLE OF CONTENTS Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 2 Authentication Basics 33 3 Types of Authentication 59 4 Usability vs Security 101 Part II Hacking MFA 121 5 Hacking MFA in General 123 6 Access Control Token Tricks 141 7 Endpoint …

Edition
-
ISBN/ISSN
9781119650799
Collation
xxxi, 542 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.84 GRI h
Availability1
Add to basket
MARC DownloadCite
cover
Hackathons: from idea to successful implementation
Comment Share
Kohne, AndreasWehmeier, Volker

This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. Table of conten…

Edition
-
ISBN/ISSN
9783030588380
Collation
xi, 106 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005 KOH h
Availability1
Add to basket
MARC DownloadCite
cover
Understanding network hacks: attack and defense with Python 3
Comment Share
Ballmann, Bastian

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense meth…

Edition
2nd Edition
ISBN/ISSN
9783662621561
Collation
xv, 220 hlm.; 24 cm
Series Title
-
Call Number
005.84 BAL u
Availability1
Add to basket
MARC DownloadCite
cover
Programming with 64-Bit ARM Assembly Language: Single Board Computer Developm…
Comment Share
Smith, Stephen

Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of…

Edition
-
ISBN/ISSN
9781484258804
Collation
xxv, 428 hlm; 23 cm
Series Title
-
Call Number
005.2 SMI p
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?