Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 30 from your keywords: subject="Hackers"
1 2 3 Next Last Page
cover
Hacker's Challenge 3 : 20 Brand New Forensic Scenarios and Solutions
Comment Share
David Polino

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hac…

Edition
Third edition
ISBN/ISSN
9780072263046
Collation
xxviii, 366 hal : ill. ; 23 cm.
Series Title
-
Call Number
005.8 POL h
Availability1
Add to basket
MARC DownloadCite
cover
Ethical hacker menjadi peretas yang beretika
Comment Share
Azis Kurniawan

“Tidak ada teknologi dan sistem informasi yang benar-benar aman”. Itulah hal yang disampaikan buku ini. Secanggih apapun, semahal apapun, bahkan sekuat apapun sistem yang dibuat dan diimplementasikan dalam pengamanan TI, akan selalu dapat ditembus, hanya masalah waktu saja. Buku ini menggambarkan bagaimana dunia siber itu penuh dengan ancaman yang berbahaya. Penulis menyajikan materi yang…

Edition
Cet. I
ISBN/ISSN
9786235507965
Collation
xii, 88 hlm.; ilus.; 20 cm
Series Title
--
Call Number
005.1092 AZI e
Availability1
Add to basket
MARC DownloadCite
cover
Panduan meretas bagi pemula (metasploitable versus kali)
Comment Share
Mochamad Adhari Adiguna

Panduan meretas menggunakan sistem operasi kali linux, di dalam buku ini dibahas mengenai kajian teoritis dari studi literatur dan praktis menggunakan perintah-perintah command line interface pada terminal kali, sehingga buku ini dapat memudahkan para pembacanya agar memahami teoritisnya sekaligus dapat mempraktekkannya. Adapun simulasi serangan yang dibahas dan diimplementasikan dalam pembahas…

Edition
Pertama
ISBN/ISSN
9786235314680
Collation
viii, 172 hlm.; ilus.; 20 cm
Series Title
--
Call Number
005.1092 MOC P
Availability1
Add to basket
MARC DownloadCite
cover
Hacker & keamanan
Comment Share
Sitorus, Eryanto

Kehadiran para hacker dalam sistem jaringan komputer telah membuat banyak orang menjadi super panik,khawatir,dan takut. Mereka takut data-data penting yang ada di dalam hard disk disabot oleh orang-orang yang tidak bertangungjawab. Mereka juga merasa kawatir setiap kali akan mengetik kata sandi(pasword). Lebuh parah lagi, mereka (para pengguna internet) menjadi gelisah, karena yamg yang namanya…

Edition
--
ISBN/ISSN
9797315819
Collation
vi, 268 hlm.; ilus.
Series Title
--
Call Number
005.8 SIT h
Availability2
Add to basket
MARC DownloadCite
cover
Ghost in the wires: my adventures as the world's most wanted hacker
Comment Share
Mitnick, KevinSimon, William L.

Table of Contents Prologue xv Part 1 The Making of a Hacker 1 Rough Start 3 2 Just Visiting 7 3 Original Sin 20 4 Escape Artist 34 5 All Your Phone Lines Belong to Me 44 6 Will Hack for Love 53 7 Hitched in Haste 62 8 Lex Luthor 72 9 The Kevin Mitnick Discount Plan 94 10 Mystery Hacker 102 Part 2 Eric 11 Foul Play 111 12 You Can Never Hide 116 13 The Wiretapper 126 14 You…

Edition
-
ISBN/ISSN
9780316037723
Collation
xii, 412 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 MIT g
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers security leaders
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…

Edition
-
ISBN/ISSN
9781119643777
Collation
x, 300 hlm; 22 cm
Series Title
-
Call Number
005.1092 CAR t
Availability2
Add to basket
MARC DownloadCite
cover
The art of invisibility: the world's most famous hacker teaches you how to be…
Comment Share
Mitnick, KevinVamosi, Robert

Like it or not, your every move is being watched and analyzed. Consumer’s identities are being stolen, and a person’s every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge–an…

Edition
-
ISBN/ISSN
9780316380508
Collation
x, 320 hlm; 24 cm
Series Title
-
Call Number
005.1092 MIT t
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers blue team
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing cos…

Edition
-
ISBN/ISSN
9781119643418
Collation
xvi, 346 hlm; 22,5 cm
Series Title
-
Call Number
005.1092 CAR t
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Hunting cyber criminals: a hacker's guide to online intelligence gathering to…
Comment Share
Troia, Vinny

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h

Edition
-
ISBN/ISSN
9781119540922
Collation
xxxi, 503 hlm.: ill.; 24 cm
Series Title
-
Call Number
005.84 TRO h
Availability1
Add to basket
MARC DownloadCite
1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?