Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 6 from your keywords: subject="Komputer dan Kejahata...
cover
Penegakan hukum tindak pidana cyber crime
Comment Share
Yurizal

Buku ini menggambarkan tenang apa itu Cyber Crime, pertanggungjawabanya dan juga penegakkan hukum tekait kejahatan cyber crime. Kehadiran buku ini tentu sangat membantu, tidak hanya bagi kalangan kepolisian untuk menangani kejahatan di dunia maya, tetapi juga bagi mahasiswa yang terkait untuk menekuni bidang hukum terkait hukum cyber. Tulisan dan riset tentang kejahatan siber dari aparat kepoli…

Edition
-
ISBN/ISSN
9786024620370
Collation
23 cm
Series Title
--
Call Number
364.168 YUR p
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime investigations : bridging the gaps between security professionals…
Comment Share
Reyes, AnthonyBrittson, RichardO'Shea, KevinSteel, Jim

Table of contents Chapter 1: Introduction: The Problem at Hand Chapter 2: "Computer Crime" discussed Chapter 3: Preparing for prosecution and testifying Chapter 4: Cyber Investigative Roles Chapter 5: Incident Response: live forensics and investigrations Chapter 6: Legal issues of intercepting WIFI transmissions Chapter 7: Seizure of digital information Chapter 8: Conducting Cyber Inv…

Edition
--
ISBN/ISSN
9781597491334
Collation
xix, 412 hal.; ilus.; 23 cm
Series Title
--
Call Number
363.23 REY c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber crime and cyber terrorism investigator's handbook
Comment Share
Akhgar, BabakStaniforth, AndrewBosco, Francesca M.

Table of Contents Chapter 1: Cyberspace: The new frontier for policing? Abstract The Shape of the Challenge The Size of the Challenge The Response Conclusion Chapter 2: Definitions of Cyber Terrorism Abstract Introduction The Confusion About Cyber Terrorism Cyber Terrorism Definition Has Cyber Terrorism Ever Occurred? Conclusions …

Edition
--
ISBN/ISSN
9780128007433
Collation
xxiii, 282 hal.; ilus.; 24 cm
Series Title
--
Call Number
R363.23 AKH c
Availability1
Add to basket
MARC DownloadCite
cover
The Basic of hacking and penetration testing: ethical hacking and penetration…
Comment Share
Enggebretson, Patrick

Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test

Edition
Second Edition
ISBN/ISSN
9780124116443
Collation
xviii, 204 hlm: ilus.; 23 cm
Series Title
--
Call Number
005.84 ENG b
Availability2
Add to basket
MARC DownloadCite
cover
Memerangi cybercrime: karakteristik, motivasi dan strategi penanganannya dala…
Comment Share
Widodo

Daftar isi: 1. Bahaya cybercrime dalam masyarakat 2. Kerangka dan konsep memerangi cybercrime dalam perspektif kriminologi 3. Keterkaitan kriminologi dan cybercrime 4. Pemanfaatan teori-teori kriminologi dalam memerangi cybercrime 5. Dimensi kriminologis cybercrime di Indonesia 6. Dimensi kriminologis cybercriminal di Indonesia 7. Analisis kriminologis terhadap upaya memerangi cybercrime…

Edition
--
ISBN/ISSN
9786027762954
Collation
xii, 215 hlm,; 24 cm.
Series Title
--
Call Number
364.1 WID m
Availability0
Add to basket
MARC DownloadCite
cover
Handbook of electronic security and digital forensics
Comment Share
Jahankhani, HamidLeonhardt, FrankMe, GianluigiWatson, David Lilburn

CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …

Edition
-
ISBN/ISSN
9789812837035
Collation
ix, 297 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
658.478 JAH h
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?