Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 13 from your keywords: subject="Computer viruses"
1 2 Next Last Page
cover
Membasmi virus komputer dan android
Comment Share
Dedik Kurniawan

Daftar isi 1. Pendahuluan 2. menciptakan virus 3. benteng pertahanan 4. PC antivirus 5. Andorid antivirus 6. Data recovery 7. Pengobatan 8. Tips dan trik

Edition
-
ISBN/ISSN
9786230016967
Collation
x, 226 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 DED m
Availability3
Add to basket
MARC DownloadCite
cover
Cult of the dead cow: how the original hacking supergroup might just save the…
Comment Share
Menn, Joseph

Table of Contents Author's Note ix The Players xi Chapter 1 An Evening in San Francisco 1 Chapter 2 Texas T-Files 9 Chapter 3 The Cons 21 Chapter 4 Underground Boston 37 Chapter 5 Back Orifice 53 Chapter 6 One Million Dollars and a Monster Truck 71 Chapter 7 Oxblood 85 Chapter 8 Much @stake 107 Chapter 9 Tor and Citizen Lab 127 Chapter 10 Jake 139 Chapter 11 Mixter, Muench, and…

Edition
-
ISBN/ISSN
9781541762367
Collation
xi, 253 hlm.; ilus.; 20,5 cm
Series Title
-
Call Number
005.84 MEN c
Availability1
Add to basket
MARC DownloadCite
cover
Malware detection
Comment Share
Wang, CliffSong, DawnChristodorescu, MihaiJha, SomeshMaughan, Douglas

Terdapat bibliografi dan indeks. Table of contents: 1. Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 2. Static Disassembly and Code Analysis 3. A Next-Generation Platform for Analyzing Executables 4. Behavioral and Structural Properties of Malicious Code 5. Detection and Prevention of SQL Injection Attacks 6. Very Fast Containment of Scanning Worms, Revisited 7.…

Edition
--
ISBN/ISSN
9781441940957
Collation
xi, 311 hal.; ilus.; 25 cm
Series Title
--
Call Number
R005.84 CHR m
Availability2
Add to basket
MARC DownloadCite
cover
Malware forensics: investigating and analyzing malicious code
Comment Share
Aquilina, James MCasey, EoghanMalin, Cameron H

Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…

Edition
--
ISBN/ISSN
9781597492683
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 AQU j
Availability1
Add to basket
MARC DownloadCite
cover
Wireless hacking
Comment Share
Efvy Zamidra Zam

Daftar isi: BAB 1 Sekilas jaringan wireless BAB 2 Persiapan perang BAB 3 War driving BAB 4 Hidden SSID BAB 5 Disconnect komputer target BAB 6 Denial of service (DoS) BAB 7 Crack wep keys BAB 8 Crack WPA/WPA2 keys BAB 9 Melacak password tersembunyi BAB 10 MAC address filtering BAB 11 Melihat daftar klien access point BAB 12 Menyusup ke komputer lain BAB 13 Mengintip webs…

Edition
Edisi revisi
ISBN/ISSN
9786020236476
Collation
x, 226 hal.; ilus.; 21 cm.; 1 + CD
Series Title
--
Call Number
005.84 EFV w
Availability3
Add to basket
MARC DownloadCite
cover
The rootkit arsenal: escape and evasion in the dark corners of the system
Comment Share
Blunden, Bill

Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…

Edition
1st edition
ISBN/ISSN
9781598220612
Collation
xxvii, 908 hal.; ilus;; 23 cm
Series Title
--
Call Number
005.8 BLU r
Availability1
Add to basket
MARC DownloadCite
cover
The art of computer virus research and defense
Comment Share
Szor, Peter

Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …

Edition
--
ISBN/ISSN
0321304543
Collation
xxvii, 713 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 SZO a
Availability1
Add to basket
MARC DownloadCite
cover
Ayo lindungi komputer anda dari virus ganas
Comment Share
Sigit Suyantoro

Daftar Isi: BAB 1 INSTALANSI ANTIVIRUS 1.1 Filtur Norton Antivirus 1.2 Intalansi Norton Antivirus 1.3 Memulai Norton Antivirus BAB 2 KONFIGURASI SCANNING 2.1 Pastikikan Protasi Otomatis 2.2 Proteksi Manual BAB 3 MELAKUKAN SEANNING 3.1 Run Full System Scen 3.2 Jadwal Full Scen 3.3 Norton Quickscen 3.4 Jadwal QuickScen 3.5 Scen All Removable Drive 3.6 Scen All Flo…

Edition
Ed. I
ISBN/ISSN
9797635589
Collation
vi, 74 hlm.; ilus.; 19 cm
Series Title
Seri oneday solution
Call Number
005.84 SIG a
Availability1
Add to basket
MARC DownloadCite
cover
Malicious cryptography: exposing cryptovirology
Comment Share
Young, AdamYung, Moti

Contents 1. Through Hacker’s Eyes 2. Cryptovirology 3. Tools for Security and Insecurity 3.1 Sources of Entropy 3.2 Entropy Extraction via Hashing 3.3 Unbiasing a Biased Coin 3.4 Combining Weak Sources of Entropy 3.5 Pseudorandom Number Generators 3.6 Uniform Sampling 3.7 Random Permutation Generation 3.8 Sound Approach to Random Number Generation and Use 3.9 RNGs Are the Beati…

Edition
--
ISBN/ISSN
764549758
Collation
xxiv, 392 hlm.; ilus.; 25 cm.
Series Title
--
Call Number
005.82 YOU m
Availability4
Add to basket
MARC DownloadCite
cover
Advanced malware analysis
Comment Share
Elisan, Christopher C.

Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …

Edition
--
ISBN/ISSN
9780071819749
Collation
xxii, 522 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 ELI a
Availability1
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?