Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 38 from your keywords: subject="Computer networks--Se...
1 2 3 4 Next Last Page
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber breach response that actually works: organizational approach to managin…
Comment Share
Gorecki, Andrew

Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…

Edition
-
ISBN/ISSN
9781119679325
Collation
xxix, 290 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 GOR c
Availability1
Add to basket
MARC DownloadCite
cover
DNS security : defending the Domain Name System
Comment Share
Liska, AllanStowe, GeoffreyGallo, Timothy

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d

Edition
-
ISBN/ISSN
9780128033067
Collation
xiii, 211 hlm.: ilus.; 23 cm
Series Title
-
Call Number
005.8 LIS d
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for CEOs and management
Comment Share
Willson, DavidDalziel, Henry

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and pro…

Edition
-
ISBN/ISSN
9780128047545
Collation
xi, 42 hm.: ilus.; 23 cm
Series Title
-
Call Number
658.4 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for corporate directors and board members
Comment Share
Willson, DavidDalziel, Henry

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity and cyberwar: what everyone needs to know
Comment Share
Friedman, AllanSinger, Peter Warren

Contents: Introduction Why write book about cybersecurity and cyberwar Why is there a cybersecurity knowledge gap, and why does in matter How did you write the book and what do yo hope to accomplish Part I How it all works The world wide what? Defining cyberspace Where did this cyber stuff come from anyway? A short history of the internet How does the internet actually work Who run…

Edition
--
ISBN/ISSN
9780199918119
Collation
viii, 306 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 SIN c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability0
Add to basket
MARC DownloadCite
cover
Formal correctness of security protocols
Comment Share
Maurer, UeliBella, Giampaolo

Contents: 1.Introduction 1.1 Motivation 1.2 Contribution 1.3 Notation 1.4 Contents Outline 2. The Analysis of Security Protocols 2.1 Formal Approaches 2.2 Interpreting the Findings 3. The Inductive Method 3.1 Isabelle 3.2 Theory Hierarchy 3.3 Agents 3.4 Cryptographic Keys 3.5 Compromised Agents 3.6 Messages 3.7 Events 3.8 Traces 3.9 Threat Model 3.10 Operators…

Edition
--
ISBN/ISSN
9783540681342
Collation
xviii, 274 hlm.; 24 cm.
Series Title
--
Call Number
005.8 BEL f
Availability2
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?