Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4 from your keywords: subject="Debugging in Computer...
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
The IDA pro book: the unofficial guide to the world's most popular disassembler
Comment Share
Eagle, Chris

Table of contents: Pt. I. Introduction to IDA Ch. 1. Introduction to Disassembly Ch. 2. Reversing and Disassembly Tools Ch. 3. IDA Pro Background Pt. II. Basic IDA Usage Ch. 4. Getting Started with IDA Ch. 5. IDA Data Displays Ch. 6. Disassembly Navigation Ch. 7. Disassembly Manipulation Ch. 8. Datatypes and Data Structures Ch. 9. Cross-References and Graphing Ch. 10. The Many Faces…

Edition
2nd Edition
ISBN/ISSN
9781593271787
Collation
xxv, 608 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.14 EAG i
Availability1
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability1
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability0
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?