Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 106 107 108 109 110 Next Last Page
cover
Quantum random number generation: theory and practice (quantum science and te…
Comment Share
Kollmitzer, ChristianSchauer, StefanRass, StefanRainer, Benjamin

This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits st…

Edition
-
ISBN/ISSN
9783319725949
Collation
-
Series Title
-
Call Number
512.7 KOL q
Availability1
Add to basket
MARC DownloadCite
cover
Security, privacy and user interaction
Comment Share
Jakobsson, Markus

Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…

Edition
-
ISBN/ISSN
9783030437534
Collation
xv, 153 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 JAK s
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Mihailescu, Marius IulianNita, Stefania Loredana

Table of contents About the Authors About the Technical Reviewer Acknowledgments Part I. Foundations 1. Getting Started in Cryptography and Cryptanalysis 2. Cryptography Fundamentals 3. Mathematical Background and Its Applicability 4. Large Integer Arithmetic 5. Floating-Point Arithmetic 6. New Features in C++20 7. Secure Coding Guidelines 8. Cryptography Libraries in C/C++20 P…

Edition
-
ISBN/ISSN
9781484265857
Collation
xvii, 469 hlm.; ilus.; 25,3 cm
Series Title
-
Call Number
005.262 MIH p
Availability1
Add to basket
MARC DownloadCite
cover
Logic synthesis for FPGA-based control units: structural decomposition in log…
Comment Share
Barkalov, AlexanderTitarenko, LarysaMielcarek, KamilChmielewski, Sławomir

This book focuses on control units, which are a vital part of modern digital systems, and responsible for the efficiency of controlled systems. The model of a finite state machine (FSM) is often used to represent the behavior of a control unit. As a rule, control units have irregular structures that make it impossible to design their logic circuits using the standard library cells. Design metho…

Edition
-
ISBN/ISSN
9783030382940
Collation
xvi, 247 hlm.; ilus.; 24 cm
Series Title
-
Call Number
629.8 BAR l
Availability1
Add to basket
MARC DownloadCite
cover
Lattice-based cryptosystems: a design perspective
Comment Share
Zhang, JiangZhang, Zhenfeng

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based e…

Edition
-
ISBN/ISSN
9789811584268
Collation
xiii, 174 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 ZHA l
Availability1
Add to basket
MARC DownloadCite
cover
Manipulated: inside the cyberwar to hijack elections and distort the truth
Comment Share
Payton, Theresa

Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…

Edition
-
ISBN/ISSN
9781538133507
Collation
xi, 193 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 PAY m
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity in humanities and social sciences: a research methods approach
Comment Share
Loiseau, HugoVentre, DanielAden, Hartmut

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…

Edition
-
ISBN/ISSN
9781786305398
Collation
xiv, 209 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8072 LOI c
Availability1
Add to basket
MARC DownloadCite
cover
Simulation for cyber-physical systems engineering: a cloud-based context (sim…
Comment Share
Mittal, SaurabhMartin, Jose L. RiscoOren, Tuncer

This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. I…

Edition
-
ISBN/ISSN
9783030519087
Collation
xiv, 451 hlm; 24 cm
Series Title
-
Call Number
004.6782 MAR s
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers security leaders
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…

Edition
-
ISBN/ISSN
9781119643777
Collation
x, 300 hlm; 22 cm
Series Title
-
Call Number
005.1092 CAR t
Availability2
Add to basket
MARC DownloadCite
cover
Programming with 64-bit ARM assembly language: single board computer developm…
Comment Share
Smith, Stephen

Table of contents 1. Getting Started 2. Loading and Adding 3. Tooling Up 4. Controlling Program Flow 5. Thanks for the Memories 6. Functions and the Stack 7. Linux Operating System Services 8. Programming GPIO Pins 9. Interacting with C and Python 10. Interfacing with Kotlin and Swift 11. Multiply, Divide, and Accumulate 12. Floating-Point Operations 13. Neon Coprocessor 14. Opt…

Edition
-
ISBN/ISSN
9781484258804
Collation
xxv, 428 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.13 SMI p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 106 107 108 109 110 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?