Perpustakaan DPR RI

  • Beranda
  • Informasi
  • Berita
  • Bantuan
  • Pustakawan
  • Area Anggota
  • Pilih Bahasa :
    Bahasa Arab Bahasa Bengal Bahasa Brazil Portugis Bahasa Inggris Bahasa Spanyol Bahasa Jerman Bahasa Indonesia Bahasa Jepang Bahasa Melayu Bahasa Persia Bahasa Rusia Bahasa Thailand Bahasa Turki Bahasa Urdu

Pencarian berdasarkan :

SEMUA Pengarang Subjek ISBN/ISSN Pencarian Spesifik

Pencarian terakhir:

{{tmpObj[k].text}}

Ditapis dengan

  • Tahun Penerbitan
    To
  • Ketersediaan
  • Lampiran
  • Tipe Koleksi
  • Format Fisik Dokumen
    Lihat Lebih Banyak
  • Lokasi
    Lihat Lebih Banyak
  • Bahasa
    Lihat Lebih Banyak
Ditemukan 7 dari pencarian Anda melalui kata kunci: subject="Keamanan Komputer"
cover
The Hacker PlayBook 3
Komentar Bagikan
Peter Kim

Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, …

Edisi
-
ISBN/ISSN
978-198-0901-75-1
Deskripsi Fisik
ix, 271 hlm.; ilus; 26 cm.
Judul Seri
-
No. Panggil
005.8 KIM t
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Optimalisasi Layanan dan Kegiatan Computer Security Incident Response Team (C…
Komentar Bagikan
Pusat Pengembangan Kompetensi Sumber Daya Manusia LegislatifRonny Virgian

Penulis memilih isu optimalisasi kegiatan dan layanan computer security incident response team (CSIRT) agar memudahkan petugas CSIRT dalam melakukan penanganan insiden, mendokumentasi kegiatan dan kesiapsiagaan dalam menghadapi serangan atau insiden siber. Hasil output kegiatan aktualisasi ini dibuat diharapkan dapat digunakan apabila ada petugas CSIRT membutuhkan

Edisi
-
ISBN/ISSN
-
Deskripsi Fisik
-
Judul Seri
LAPORAN AKTUALISASI
No. Panggil
-
Ketersediaan0
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Controlling The Human Element Of Security : The Art Of Deception
Komentar Bagikan
Kevin D. MitnickWilliam L. Simon

The Art of Deception is a book by Kevin Mitnick that covers the art of social engineering. Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the examples, are fictional but quite plausible.In his worldwide bestseller Secrets and Lies, Bruce Schneier made the case that achieving successful computer security is…

Edisi
-
ISBN/ISSN
978-0-7645-4280-0
Deskripsi Fisik
xv, 351 hlm.; 23 cm.
Judul Seri
-
No. Panggil
-
Ketersediaan0
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Cybersecurity : A Comprehensive Begginer's Guide To Learn The Realms Of Cyber…
Komentar Bagikan
Elijah Lewis

There is no shortage of books on cyber security. They have been flooding the online markets and book stores for years. Each book claims to have touched upon all the topics pertaining to cybersecurity. They make tall claims that their book is the best and the only one that has the keys to the treasures of knowledge on cyber security, but, to tell the truth, they literally fail to impress well-tr…

Edisi
-
ISBN/ISSN
978-1659-191-68-4
Deskripsi Fisik
vi, 107 hlm.; 23 cm.
Judul Seri
-
No. Panggil
658.4 LEW c
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Cyber Security
Komentar Bagikan
Jack CaravelliNigel Jones

This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developm…

Edisi
-
ISBN/ISSN
978-1-4408-6173-4
Deskripsi Fisik
ix, 245 hlm.; 24 cm.
Judul Seri
-
No. Panggil
658.4 CAR c
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Defending The Digital Frontier
Komentar Bagikan
Jan BabiakJohn ButtersMark W. Doll

This book about is describes and approach for creating an enterprise-wide security culture based on business-led risk management principles. Business executives and outlines a clear plan for ensuring that their digital security approach and programmes will protect their organisation's assets and people.

Edisi
2nd Edition
ISBN/ISSN
0-471-68087-7
Deskripsi Fisik
xvii, 253 hlm. : il. ; 24 cm.
Judul Seri
-
No. Panggil
-
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
The SSCP Prep Guide
Komentar Bagikan
Debra S Isaac

This book about information mechanisms to specify user and process rights, system vulnerabilities, safeguards and recovery plans and procedures, means to disguise information to ensure its integrity, confidentiality, authenticity and nonrepudiation, ways to protect againts infection, abuse or negative impacts to the proper operation of an information processing systems or network.

Edisi
-
ISBN/ISSN
0-471-27351-1
Deskripsi Fisik
xviii, 508 hal. ; ill. : 24 cm
Judul Seri
-
No. Panggil
-
Ketersediaan0
Tambahkan ke dalam keranjang
Unduh MARCSitasi
Perpustakaan DPR RI
  • Informasi
  • Layanan
  • Pustakawan
  • Area Anggota

Tentang Kami

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Cari

masukkan satu atau lebih kata kunci dari judul, pengarang, atau subjek

Donasi untuk SLiMS Kontribusi untuk SLiMS?

© 2025 — Senayan Developer Community

Ditenagai oleh SLiMS
Pilih subjek yang menarik bagi Anda
  • Karya Umum
  • Filsafat
  • Agama
  • Ilmu-ilmu Sosial
  • Bahasa
  • Ilmu-ilmu Murni
  • Ilmu-ilmu Terapan
  • Kesenian, Hiburan, dan Olahraga
  • Kesusastraan
  • Geografi dan Sejarah
Icons made by Freepik from www.flaticon.com
Pencarian Spesifik
Kemana ingin Anda bagikan?