Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 76 from your keywords: author=S'to
First Page Previous 1 2 3 4 5 Next Last Page
cover
Analog VLSI circuits for the perception of visual motion
Comment Share
Stocker, Alan A.

Contents 1 Introduction 2 Visual motion perception 3 Optimization networks 4 Visual motion perception networks 5 Analog VLSI implementation 6 Smooth optical flow chip 7 Extended network implementations 8 Comparison to human motion vision Appendix A Variational calculus B Simulation methods C Transistors and basic circuits D Process parameters and chips specifications

Edition
--
ISBN/ISSN
9780470854914
Collation
ix, 227 hlm.; ilus.; 25 cm
Series Title
--
Call Number
004 STO A
Availability1
Add to basket
MARC DownloadCite
cover
Malware, rootkits & botnets: a beginner's guide
Comment Share
Elisan, Christopher C.

Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …

Edition
--
ISBN/ISSN
9780071792066
Collation
xxvi, 353 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 ELI m
Availability1
Add to basket
MARC DownloadCite
cover
Management reset: mengorganisir kembali menuju efektivitas berkesinambungan
Comment Share
Edina T. SofiaLawler III, Edward E.Worley, Christopher G.

Judul Asli: Management reset: organizing for sustainable effectiveness DAFTAR ISI: 1. Waktu Untuk mengatur kembali 2. Manajemen berkesinambungan 3. Strategi untuk efektivitas berkesinambungan 4. Mengembangkan strategi 5. Tata kelola dewan 6. Struktur untuk efektivitas berkesinambungan 7. System kerja berkesinambungan 8. Mengelola kinerja 9. System reward 10. Mengelola talenta 11. M…

Edition
-
ISBN/ISSN
9789790624016
Collation
xviii, 377 hlm.; 24 cm.
Series Title
-
Call Number
658.4 LAW m
Availability1
Add to basket
MARC DownloadCite
cover
E-discovery: an introduction to digital evidence
Comment Share
Amelia, PhillipsGodfrey, RonaldSteuart, ChristopherBrown, Christine

Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery

Edition
--
ISBN/ISSN
9781111310646
Collation
xvi, 254 hal.; ilus.; 24 cm
Series Title
--
Call Number
347.73 PHI e
Availability1
Add to basket
MARC DownloadCite
cover
Guide to computer forensics and investigations
Comment Share
Steuart, ChristopherNelson, BillPhillips, Amelia

Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …

Edition
Fourth Edition
ISBN/ISSN
9781435498839
Collation
xxv, 682 hal.; ilus.; 24 cm + 1 DVD-ROM
Series Title
--
Call Number
005.8 NEL g
Availability1
Add to basket
MARC DownloadCite
cover
Linux bible: the comprehensive, tutorial resource
Comment Share
Negus, Christopher

Contents: Part I Getting started Chapter 1 Starting with linux Chapter 2 Creating the perfect linux desktop Part II Becoming a linux power user Chapter 3 Using the shell Chapter 4 Moving around the filesystem Chapter 5 Working with text files Chapter 6 Managing running processes Chapter 7 Writing simple shell scripts Part III Becoming a linux system administrator Chapter…

Edition
Ninth edition
ISBN/ISSN
9781118999875
Collation
xxxvii, 873 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.43 NEG l
Availability2
Add to basket
MARC DownloadCite
cover
Acuan ringkas dBASE IV
Comment Share
Alexander SindoroStone, Deborah L.

Judul Asli: dBASE IV Quick reference Daftar isi: Acuan perintah Dbase IV Fungsi Dbase IV Fungsi SQL Indeks

Edition
Cetakan pertama
ISBN/ISSN
33010067
Collation
vi, 200 hlm.; 17 cm
Series Title
Seri referensi saku
Call Number
005.74 STO a
Availability0
Add to basket
MARC DownloadCite
cover
Advanced malware analysis
Comment Share
Elisan, Christopher C.

Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …

Edition
--
ISBN/ISSN
9780071819749
Collation
xxii, 522 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 ELI a
Availability1
Add to basket
MARC DownloadCite
cover
Real-time C++: efficient object-oriented and template microcontroller program…
Comment Share
Kormanyos, Christopher

Contents Part I Language technologies for real-time C++ 1 Getting started with real-time C++ 2 Working with a real-time C++ program on a board 3 An easy jump-start in real-time C++ 4 Object-oriented techniques for microcontrollers 5 C++ templates for microcontrollers 6 Optimized C++ programming for microcontrollers Part II Components for real-time C++ 7 Accessing mic 8 The right sta…

Edition
Second Edition
ISBN/ISSN
9783662478097
Collation
xxviii, 378 hal.; ilus.; 24 cm
Series Title
--
Call Number
629.8 KOR r
Availability1
Add to basket
MARC DownloadCite
cover
TA-MODIFIKASI SECURE ELECTRONIC CONTRACT SIGNING (SECS-1) DENGAN PUBLIK KEY I…
Comment Share
Dwi Mustofa

Aplikasi Secure Electronic Contract Signing (SECS-1) merupakan aplikasi penandatanganan kontrak secara elektronik sebagai perjanjian kerja maupun kerjasama antar intsansi yang berkepentingan. Aplikasi SECS-1 dibuat oleh Qusyairi Ridho Saeful Fidni pada tahun 2012. Aplikasi tersebut mengimplementasikan protokol simultaneous contract signing sebagai protokol standart dalam penandatanganan kontak …

Edition
-
ISBN/ISSN
-
Collation
xii, 127 hlm.; ilus.; lamp.; 29 cm
Series Title
-
Call Number
TA-SKRIPSI DWI M
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?