Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 35 from your keywords: author="STEIN"
1 2 3 4 Next Last Page
cover
NET security and cryptography
Comment Share
Peter ThorsteinsonArun Ganesh

Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantia…

Edition
-
ISBN/ISSN
9780131008551955499
Collation
xvii, 466 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 THO n
Availability1
Add to basket
MARC DownloadCite
cover
Dunia sophie: sebuah novel filsafat
Comment Share
Gaarder, Jostein

"Novel ini berkisah tentang pergulatan para filsuf dalam bertanya, berdebat, dan merenung pelbagai jawaban kehidupan. Cara berkisah novel ini sungguh memikat dan pasti membuat pembaca awam semakin 'kepincut' untuk membacanya tanpa jeda. Dunia Sophie adalah pengantar ke dunia filsafat yang paling menarik karena disajikan dalam bentuk cerita setengah detektif. Seru, tegang, mendebarkan, namun men…

Edition
Cetakan VI
ISBN/ISSN
9789794335741
Collation
798 hlm.; 20 cm
Series Title
--
Call Number
813 GAA d
Availability0
Add to basket
MARC DownloadCite
cover
Post-quantum cryptography
Comment Share
Bernstein, Daniel J.Buchmann, JohannesDahmen, Erik

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …

Edition
-
ISBN/ISSN
9783540887010
Collation
viii, 245 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R005.82 BER p
Availability3
Add to basket
MARC DownloadCite
cover
Oracle PL/SQL programming
Comment Share
Feuerstein, StevenPribyl, Bill

Terdapat bibliografi dan indeks. Table of Contents Part I Programming in PL/SQL Chapter 1 Introduction to PL/SQL What Is PL/SQL? The Origins of PL/SQL So This Is PL/SQL About PL/SQL Versions Resources for PL/SQL Developers Some Words of Advice Chapter 2 Creating and Running PL/SQL Code Navigating the Database Creating and Editing Source Code SQL*Plus Performi…

Edition
Fifth edition
ISBN/ISSN
9780596514464
Collation
xxxviii, 1186 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.74 FEU o
Availability1
Add to basket
MARC DownloadCite
cover
Malware analyst's cookbook and DVD: tools and techniques for fighting malicio…
Comment Share
Ligh, Michael HaleAdair, StevenHartstein, BlakeRichard, Matthew

Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…

Edition
--
ISBN/ISSN
9780470613030
Collation
xxi, 716 hal.; ilus.; 24 cm + 1 DVD
Series Title
--
Call Number
005.84 LIG m
Availability1
Add to basket
MARC DownloadCite
cover
Database systems: an application-oriented approach
Comment Share
Kifer, MichaelBernstein, ArthurLewis, Philip M.

Contents Part One: Introduction Chapter 1. Overview of Databases and Transactions 1.1. What are Databases and Transactions? 1.2. Features of Modern Databases and Transactions Processing Systems 1.3. Major Players in the Implementation and Support of Databases and Transactions Processing Systems 1.4. Decision Support Systems - OLAP and OLTP Chapter 2. The Big Picture 2.1. Case Study:…

Edition
Second Edition
ISBN/ISSN
0321312562
Collation
xxxi. 1235 hal.; ilus.; 23 cm
Series Title
-
Call Number
005.7 KIF D
Availability1
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9781441926746
Collation
xv, 523 hlm.; 24 cm
Series Title
--
Call Number
652.8 HOF u2
Availability1
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9780387779935
Collation
xv, 523 hlm.; 24 cm.
Series Title
--
Call Number
652.8 HOF i
Availability5
Add to basket
MARC DownloadCite
cover
Advance in information systems set (volume 2): information and knowledge system
Comment Share
Arduin, Pierre-EmmanuelGrundstein, MichelRosenthal-Sabroux, Camille

Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …

Edition
--
ISBN/ISSN
9781848217522
Collation
xiii, 82 hal.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
004 ARD a
Availability1
Add to basket
MARC DownloadCite
cover
Security without obscurity a guide to PKI operations
Comment Share
Stapleton, J. J.Epstein, W. Clay

Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI

Edition
--
ISBN/ISSN
9781498707473
Collation
xv, 343 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 STA s
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?