Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 33 from your keywords: subject="hacker"
1 2 3 4 Next Last Page
cover
Hacker's Challenge 3 : 20 Brand New Forensic Scenarios and Solutions
Comment Share
David Polino

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hac…

Edition
Third edition
ISBN/ISSN
9780072263046
Collation
xxviii, 366 hal : ill. ; 23 cm.
Series Title
-
Call Number
005.8 POL h
Availability1
Add to basket
MARC DownloadCite
cover
Ethical hacker menjadi peretas yang beretika
Comment Share
Azis Kurniawan

“Tidak ada teknologi dan sistem informasi yang benar-benar aman”. Itulah hal yang disampaikan buku ini. Secanggih apapun, semahal apapun, bahkan sekuat apapun sistem yang dibuat dan diimplementasikan dalam pengamanan TI, akan selalu dapat ditembus, hanya masalah waktu saja. Buku ini menggambarkan bagaimana dunia siber itu penuh dengan ancaman yang berbahaya. Penulis menyajikan materi yang…

Edition
Cet. I
ISBN/ISSN
9786235507965
Collation
xii, 88 hlm.; ilus.; 20 cm
Series Title
--
Call Number
005.1092 AZI e
Availability1
Add to basket
MARC DownloadCite
cover
Panduan meretas bagi pemula (metasploitable versus kali)
Comment Share
Mochamad Adhari Adiguna

Panduan meretas menggunakan sistem operasi kali linux, di dalam buku ini dibahas mengenai kajian teoritis dari studi literatur dan praktis menggunakan perintah-perintah command line interface pada terminal kali, sehingga buku ini dapat memudahkan para pembacanya agar memahami teoritisnya sekaligus dapat mempraktekkannya. Adapun simulasi serangan yang dibahas dan diimplementasikan dalam pembahas…

Edition
Pertama
ISBN/ISSN
9786235314680
Collation
viii, 172 hlm.; ilus.; 20 cm
Series Title
--
Call Number
005.1092 MOC P
Availability1
Add to basket
MARC DownloadCite
cover
Hacker & keamanan
Comment Share
Sitorus, Eryanto

Kehadiran para hacker dalam sistem jaringan komputer telah membuat banyak orang menjadi super panik,khawatir,dan takut. Mereka takut data-data penting yang ada di dalam hard disk disabot oleh orang-orang yang tidak bertangungjawab. Mereka juga merasa kawatir setiap kali akan mengetik kata sandi(pasword). Lebuh parah lagi, mereka (para pengguna internet) menjadi gelisah, karena yamg yang namanya…

Edition
--
ISBN/ISSN
9797315819
Collation
vi, 268 hlm.; ilus.
Series Title
--
Call Number
005.8 SIT h
Availability2
Add to basket
MARC DownloadCite
cover
The pentester blueprint: starting a career as an ethical hacker
Comment Share
Wylie, Phillip LCrawley, Kim

Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…

Edition
-
ISBN/ISSN
9781119684305
Collation
xx, 172 hlm; ilus.; 23 cm
Series Title
--
Call Number
005.1092 WYL t
Availability1
Add to basket
MARC DownloadCite
cover
Melumpuhkan hacker dengan web application firewall (WAF)
Comment Share
Girindro Pringgo Digdo

Pada buku ini membahas mengenai sebuah komponen yang dinamakan Web Application Firewall (WAF). Komponen ini dapat digunakan sebagai alat pertahanan pada aplikasi web. Pengguna dapat melindungi banyak applikasi web hanya dengan satu komponen ini. Selain itu, dengan menggunakan komponen ini, pengguna tidak perlu repot untuk mengubah isi kode sumber karna prinsip keamanan pada komponen ini adalah …

Edition
-
ISBN/ISSN
9787792953091
Collation
viii, 104 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.1092 GIR m
Availability2
Add to basket
MARC DownloadCite
cover
Ghost in the wires: my adventures as the world's most wanted hacker
Comment Share
Mitnick, KevinSimon, William L.

Table of Contents Prologue xv Part 1 The Making of a Hacker 1 Rough Start 3 2 Just Visiting 7 3 Original Sin 20 4 Escape Artist 34 5 All Your Phone Lines Belong to Me 44 6 Will Hack for Love 53 7 Hitched in Haste 62 8 Lex Luthor 72 9 The Kevin Mitnick Discount Plan 94 10 Mystery Hacker 102 Part 2 Eric 11 Foul Play 111 12 You Can Never Hide 116 13 The Wiretapper 126 14 You…

Edition
-
ISBN/ISSN
9780316037723
Collation
xii, 412 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 MIT g
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers security leaders
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…

Edition
-
ISBN/ISSN
9781119643777
Collation
x, 300 hlm; 22 cm
Series Title
-
Call Number
005.1092 CAR t
Availability2
Add to basket
MARC DownloadCite
cover
The art of invisibility: the world's most famous hacker teaches you how to be…
Comment Share
Mitnick, KevinVamosi, Robert

Like it or not, your every move is being watched and analyzed. Consumer’s identities are being stolen, and a person’s every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge–an…

Edition
-
ISBN/ISSN
9780316380508
Collation
x, 320 hlm; 24 cm
Series Title
-
Call Number
005.1092 MIT t
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers blue team
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing cos…

Edition
-
ISBN/ISSN
9781119643418
Collation
xvi, 346 hlm; 22,5 cm
Series Title
-
Call Number
005.1092 CAR t
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?