Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 58 from your keywords: subject="Computer networks -- ...
1 2 3 4 5 Next Last Page
cover
ISO/IEC 27000 -- Information technology -- security techniques -- Information…
Comment Share
ISO/IEC

Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …

Edition
Fifth edition
ISBN/ISSN
--
Collation
v, 27 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents: Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 7.1 General 7.2 Unauthorized access 7.3 Packet sniffing 7.4 Rogue wireless access point 7.5 Denial of service attack 7.6 Bluejacking 7.7 Bluesnarfing 7.8 Adhoc networks 7.9 Other threats 8 Security requirements 8…

Edition
First edition
ISBN/ISSN
--
Collation
vii, 26 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Page Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Internet access services for employees 7.1 Background 7.2 Security threats 7.3 Security design techniques and controls 8 Business to business services 8.1 Background 8.2 Security threats 8.3 Security design techniques and controls 9 Business to customer s…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 30 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 9 Security controls 9.1 Overview 9.2 Stateless packet filtering 9.3 Stateful packet inspection 9.4 Application firewall 9.5 Content filtering 9.6 Intrusion prevention system and intrusion detection system 9.7 Security m…

Edition
First edition
ISBN/ISSN
--
Collation
v, 22 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents : Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Overview 6.1 Introduction 6.2 Types of VPNs 7 Security Threats 8 Security Requirements 8.1 Overview 8.2 Confidentiality 8.3 Integrity 8.4 Authenticity 8.5 Authorization 8.6 Availability 8.7 Tunnel Endpoint Security 9 Security Controls 9.1 Securit…

Edition
First edition
ISBN/ISSN
--
Collation
iv, 14 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Document structure 6 Preparing for design of network security 6.1 Introduction 6.2 Asset identification 6.3 Requirements collection 6.3.1 Legal and regulatory requirements 6.3.2 Business requirements 6.3.3 Performance requirements 6.4 Review requirements 6.5 Review of existing designs and i…

Edition
First edition corrected version
ISBN/ISSN
--
Collation
v, 28 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27001 -- Information technology -- security techniques -- Informatio…
Comment Share
ISO/IEC

Contents : Foreword 0 Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties 4.3 Determining the scope of the information security management system 4.4 Information security management system 5 Leadership 5.1 Leadership…

Edition
Second edition
ISBN/ISSN
--
Collation
v, 23 cm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents Foreword Introduction 1. Scope 2. Normative reference 3. Terms and definitions 4. Symbols and abbreviated terms 5. Structure 6. Overview 6.1 Background 6.2 Networks security planning 7. Identifying risk and preparing to identify security controls 7.1 Introduction 7.2 Information on current and/or planned networking 7.2.1 Security requirements in corporate information secu…

Edition
Second edition
ISBN/ISSN
-
Collation
viii, 48 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
Extrusion detection: security monitoring for internal intrusions
Comment Share
Bejtlich, Richard

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…

Edition
-
ISBN/ISSN
0321349962
Collation
xxviii, 385 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 BEJ e
Availability1
Add to basket
MARC DownloadCite
cover
IPv6 security
Comment Share
Hogg, ScottVyncke, Eric

Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…

Edition
--
ISBN/ISSN
9781587055942
Collation
xxi, 540 hal.; ilus.; 23 cm
Series Title
Cisco Press networking technology series
Call Number
005.8 HOG i
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?