Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4 from your keywords: author=Stamp, Mark
cover
Information security: principle and practice
Comment Share
Stamp, Mark

Contents: I INTRODUCTION 1 Crypto 2 Crypto basics 3 Symmetric key crypto 4 Public key crypto 5 Hash function and other topics 6 Advanced cryptanalysis II ACCESS CONTROL 7 Authentication 8 Authorization III PROTOCOLS 9 Simple authention protocols 10 Real-world security protocols IV SOFTWARE 11 Software flaw and malware 12 Insecurity in software 13 Operating syst…

Edition
--
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005 STA i
Availability4
Add to basket
MARC DownloadCite
cover
Applied cryptanalysis: breaking ciphers in the real world
Comment Share
Stamp, MarkLow, Richard M.

Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra

Edition
--
ISBN/ISSN
9780470114865
Collation
xix, 401 hlm.; 24 cm.
Series Title
--
Call Number
005.82 STA a
Availability14
Add to basket
MARC DownloadCite
cover
Information security
Comment Share
Gerhart, BarryStamp, MarkWright, Patrick M.

Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…

Edition
null
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.8 STA i
Availability5
Add to basket
MARC DownloadCite
cover
Information security
Comment Share
Stamp, Mark

Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…

Edition
null
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.8 STA i
Availability5
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?