Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 106 107 108 109 110 Next Last Page
cover
Linear algebra and optimization for machine learning: a textbook
Comment Share
Aggarwal, Charu C.

This textbook introduces linear algebra and optimization in the context of machine learning. Examples and exercises are provided throughout the book. A solution manual for the exercises at the end of each chapter is available to teaching instructors. This textbook targets graduate level students and professors in computer science, mathematics and data science. Advanced undergraduate students ca…

Edition
-
ISBN/ISSN
9783030403430
Collation
xxi, 495 hlm.; ilus.; 26 cm
Series Title
-
Call Number
512.5 AGG l
Availability1
Add to basket
MARC DownloadCite
cover
Resilience of cyber-physical systems: from risk modelling to threat counterac…
Comment Share
Flammini, Francesco

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs' exposu…

Edition
-
ISBN/ISSN
9783319955964
Collation
xvi, 229 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 FLA r
Availability1
Add to basket
MARC DownloadCite
cover
Linux command line and shell scripting bible
Comment Share
Bresnahan, ChristineBlum, Richard

Table of Contents Acknowledgments xi Part I: The Linux Command Line 1 Chapter 1: Starting with Linux Shells 3 Chapter 2: Getting to the Shell 21 Chapter 3: Basic Bash Shell Commands 47 Chapter 4: More Bash Shell Commands 85 Chapter 5: Understanding the Shell 113 Chapter 6: Using Linux Environment Variables 137 Chapter 7: Understanding Linux File Permissions 163 Chapter 8: Managing…

Edition
4th ed.
ISBN/ISSN
9781119700913
Collation
xxxiii, 791 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.43 BLU l
Availability1
Add to basket
MARC DownloadCite
cover
Don't teach coding: until you read this book
Comment Share
Handley, Lindsey D.Foster, Stephen R.

Table of Contents About the Authors xi Acknowledgments xiii Introduction 1 Who is This Book For? 3 Let’s Do It! 3 Chapter 1: Prologues 5 A Wizard’s Tale 5 The Sorting of Wizards 5 The Call to Action 10 A Language Without 10 Our Strange Protagonists 10 (cons 'Apple 'Soft) 13 Tower of Babel 15 Confessions 16 Penances 17 A Language Within 17 Installing Languages 17 Writ…

Edition
-
ISBN/ISSN
9781119602620
Collation
xiii, 264 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.15 HAN d
Availability1
Add to basket
MARC DownloadCite
cover
Handbook of big data privacy
Comment Share
Dehghantanha, AliChoo, Kim-Kwang Raymond

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to o…

Edition
-
ISBN/ISSN
9783030385569
Collation
ix, 397 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.74 CHO h
Availability1
Add to basket
MARC DownloadCite
cover
Hyperconverged infrastucture data centers: demystifying HCI
Comment Share
Halabi, Sam

This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the context of a legacy data center design, detailing the problem statement for the particular technology a…

Edition
-
ISBN/ISSN
9781587145100
Collation
xxxii, 509 hlm.; illus.; 24 cm
Series Title
Cisco Press networking technology series
Call Number
004.68 HAL h
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity manager's guide: the art of building your security program
Comment Share
Barnum, Todd

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building an…

Edition
-
ISBN/ISSN
9781492076216
Collation
vii, 167 hlm; 22,5 cm
Series Title
-
Call Number
005.8 BAR c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
cover
Digital forensic education: an experiential learning approach (studies in big…
Comment Share
Choo, Kim-Kwang RaymondZhang, Xiaolu

In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also pr…

Edition
-
ISBN/ISSN
9783030235499
Collation
xii, 307 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
363.25 ZHA d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 106 107 108 109 110 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?