Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 20 from your keywords: subject="Data protection"
1 2 Next Last Page
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
cover
The digital big bang : the hard stuff, the soft stuff, and the future of cybe…
Comment Share
Quade, Phil

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for CEOs and management
Comment Share
Willson, DavidDalziel, Henry

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and pro…

Edition
-
ISBN/ISSN
9780128047545
Collation
xi, 42 hm.: ilus.; 23 cm
Series Title
-
Call Number
658.4 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security awareness for corporate directors and board members
Comment Share
Willson, DavidDalziel, Henry

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c

Edition
-
ISBN/ISSN
9780128047569
Collation
xi, 40 hlm.: ilus.; 23 cm
Series Title
-
Call Number
658.40058 WIL c
Availability1
Add to basket
MARC DownloadCite
cover
Implementing database security and auditing: a guide for DBAs, information se…
Comment Share
Ben-Natan, Ron

Terdapat indeks. Table of contents: 1. Getting started 2. Database security within the general security landscape and a defense-in-depth strategy 3. The database as a networked server 4. Authentication and password security 5. Application security 6. Using granular access control 7. Using the database to do too much 8. Securing database-to-database communications 9. Trojans 10. Enc…

Edition
--
ISBN/ISSN
1555583342
Collation
xvii, 413 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BEN i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-security and global information assurance: threat analysis and response…
Comment Share
Knapp, Kenneth J.

Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…

Edition
--
ISBN/ISSN
9781605663265
Collation
xxii, 434 hal.; ilus.; 29 cm
Series Title
Premier reference source
Call Number
005.8 KNA c
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
The digital person: technology and privacy in the information age
Comment Share
Solove, Daniel J.

Table of contents: 1. Introduction 2. The rise of the digital dossier 3. Kafka and Orwell : reconceptualizing information privacy 4. The problems of information privacy law 5. The limits of market-based solutions 6. Architecture and the protection of privacy 7. The problem of public records 8. Access and aggregation : rethinking privacy and transparency 9. Government information gathe…

Edition
1st edition
ISBN/ISSN
0814798462
Collation
xii, 282 hal.; 24 cm
Series Title
--
Call Number
342.7308 SOL d
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, information, and technology
Comment Share
Solove, Daniel J.Schwartz, Paul M.

Contents: 1. Introduction Information privacy, technology, and the law Information privacy law : origins and types Perspectives on privacy 2. Privasi and law enforcement The Fourth Amendment and emerging technology Federal electronic surveillance law Digital searches and seizures National security and foreign intelligence 3. Privacy and goverenment records and d…

Edition
Third Edition
ISBN/ISSN
9780735510425
Collation
xxiii, 576 hal.; ilus.; 26 cm
Series Title
Aspen electives series
Call Number
342.73 SOL p
Availability1
Add to basket
MARC DownloadCite
cover
Information Technology Risk Management in enterprise Environments:a review in…
Comment Share
Jane KounsDaniel Minoli

CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…

Edition
first
ISBN/ISSN
9780471762546
Collation
xvii,421hal.;ilus.;24cm
Series Title
null
Call Number
658.4 KOU i
Availability1
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?