Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 7 from your keywords: author=Schneier, Bruce
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Practical cryptography
Comment Share
Ferguson, NielsSchneier, Bruce

Terdapat indeks. Table of contents: 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I_ Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II_ Key Negotiation. 10. Generating Rando…

Edition
First edition
ISBN/ISSN
9780471223573
Collation
xx, 410 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 FER p
Availability10
Add to basket
MARC DownloadCite
cover
We have root: even more advice from schneier on security
Comment Share
Schneier, Bruce

In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to…

Edition
-
ISBN/ISSN
9781119643012
Collation
xiii, 304 hlm; 23 cm
Series Title
-
Call Number
005.8 SCH w
Availability1
Add to basket
MARC DownloadCite
cover
Click here to kill everybody: security and survival in a hyper-connected world
Comment Share
Schneier, Bruce

Table of Contents Introduction: Everything is Becoming a Computer Part 1: The Trends 1. Computers Are Still Hard to Secure 2. Patching Is Failing as a Security Paradigm 3. Knowing Who’s Who on the Internet Is Getting Harder 4. Everyone Favors Insecurity 5. Risks are Becoming Catastrophic Part 2: The Solutions 6. What a Secure Internet+ Looks Like 7. How We Can Secure the Interne…

Edition
-
ISBN/ISSN
9780393608885
Collation
viii, 319 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
Applied cryptography: protocols, algorithms, and source code in C
Comment Share
Schneier, Bruce

Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…

Edition
Second Edition
ISBN/ISSN
9780471117094
Collation
xxiii, 758 hlm.; 24 cm.
Series Title
--
Call Number
005.82 SCH a
Availability12
Add to basket
MARC DownloadCite
cover
Beyond fear : thinking sensibly about security in an uncertain world
Comment Share
Schneier, Bruce

Contents Part One: Sensible Security 1. All Security Involves Trade-offs 2. Security Trade-offs Are Subjective 3. Security Trade-offs Depend on Power and Agenda Part Two: How Security Works 4. Systems and How They Fail 5. Knowing the Attackers 6. Attackers Never Change Their Tunes, Just Their Instruments 7. Technology Creates Security Imbalances 8. Security Is a Weakest-Link Probl…

Edition
-
ISBN/ISSN
9780387026206
Collation
295 hal.; ilus.;24 cm
Series Title
-
Call Number
363.3 SCH b
Availability4
Add to basket
MARC DownloadCite
cover
Secrets and lies: digital security in a networked world
Comment Share
Schneier, Bruce

Table of Contents THE LANDSCAPE. Digital Threats. Attacks. Adversaries. Security Needs. TECHNOLOGIES. Cryptography. Cryptography in Context. Computer Security. Identification and Authentication. Networked-Computer Security. Network Security. Network Defenses. Software Reliability. Secure Hardware. Certificates and Credentials. Security Tricks. The Human Factor. STRATEGIES. …

Edition
-
ISBN/ISSN
471453803
Collation
xxiii, 414 hlm.; 24 cm.
Series Title
-
Call Number
005.8 SCH s
Availability3
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?