Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 12 from your keywords: subject="Penetration testing (...
1 2 Next Last Page
cover
Analisis Keamanan Aplikasi Situs Web Sistem Informasi Dokumen Elektronik (SID…
Comment Share
Susila WindartaAmiruddinIra Rosianal HikmahIlham Dwi Harjanto

Sistem Informasi Dokumen Elektronik (SIDOEL) adalah aplikasi situs web milik PT Angkasa Pura II dirancang untuk mengelola dokumen dan arsip secara elektronik, memudahkan karyawan dalam pengelolaan dokumen. Meskipun upaya mitigasi telah dilakukan melalui vulnerability assessment dan penetration testing, pemindaian pada Oktober 2023 masih menemukan kerentanan dalam sistem ini. Penelitian ini ber…

Edition
-
ISBN/ISSN
--
Collation
xiv + 91 hal
Series Title
-
Call Number
2024 ILH a
Availability2
Add to basket
MARC DownloadCite
cover
Penetration testing: a hands-on guide for beginners
Comment Share
Wallace, Connor

This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or hacking. It will cover all the details completely from start to end. You will learn …

Edition
--
ISBN/ISSN
9798614981143
Collation
viii, 185 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WAL p
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Linn, RyanEagle, ChrisHarper, AllenRegalado, DanielSims, StephenSpasojevic, BrankoMartinez, LindaBaucom, MichaelHarris, The Late Shon

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, ov…

Edition
Fifth edition
ISBN/ISSN
9781260108415
Collation
640 hlm.; 23 cm
Series Title
-
Call Number
005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
The basics of hacking and penetration testing: ethical hacking and penetratio…
Comment Share
Engebretson, Patrick

Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test

Edition
1st edition
ISBN/ISSN
9781597496551
Collation
xvii, 159 hal.; ilus.; 24 cm
Series Title
Syngress the basics
Call Number
005.84 ENG b
Availability1
Add to basket
MARC DownloadCite
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Computer and information security handbook
Comment Share
Vacca, John R.

Table of contents: Part I Overview of System and Network Security: A Comprehensive Introduction Chapter 1 Building a Secure Organization 1.1 Obstacles To Security 1.2 Ten Steps To Building A Secure Organization 1.3 Don’t Forget The Basics 1.4 Preparing For The Building Of Security Control Assessments 1.5 Summary 1.6 Chapter Review Questions/Exercises 1.7 Optional Team Case Project …

Edition
Second Edition
ISBN/ISSN
9780123943972
Collation
xxviii, 1171 hal.; ilus.; 29 cm
Series Title
--
Call Number
R005.8 VAC c
Availability1
Add to basket
MARC DownloadCite
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
Coding for penetration testers: building better tools
Comment Share
Andress, JasonLinn, Ryan

Table of Contents 1. Intro to Command Shell Scripting - Information in this Chapter - On Shell Scripting - UNIX, Linux, and OS X Shell Scripting - Bash Basics - Putting It All Together with Bash - Windows Scripting - PowerShell Basics - Putting it all together with PowerShell 2. Intro to Python - Information in this Chapter - What is Python? - W…

Edition
1st edition
ISBN/ISSN
9781597497299
Collation
xxiv, 295 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND c
Availability1
Add to basket
MARC DownloadCite
cover
Google hacking for penetration testers
Comment Share
Long, JohnnyGardner, BillBrown, Justin

Table of Contents Chapter 1: Google Search Basics Abstract Introduction Exploring Google’s web-based interface Summary Fast track solutions Chapter 2: Advanced Operators Abstract Introduction Operator syntax Troubleshooting your syntax Introducing Google’s advanced operators “In…

Edition
Third Edition
ISBN/ISSN
9780128029640
Collation
225 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 LON g
Availability1
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?