Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 106 107 108 109 110 Next Last Page
cover
Fundamentals of digital forensics: theory, methods, and real-life applications
Comment Share
Kävrestad, Joakim

This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis …

Edition
Second edition
ISBN/ISSN
9783030389536
Collation
xiii, 268 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
363.25 KAV f
Availability1
Add to basket
MARC DownloadCite
cover
Hacking multifactor authentication
Comment Share
Grimes, Roger A.

TABLE OF CONTENTS Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 2 Authentication Basics 33 3 Types of Authentication 59 4 Usability vs Security 101 Part II Hacking MFA 121 5 Hacking MFA in General 123 6 Access Control Token Tricks 141 7 Endpoint …

Edition
-
ISBN/ISSN
9781119650799
Collation
xxxi, 542 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.84 GRI h
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
cover
Quantum cryptography: from key distribution to conference key agreement (quan…
Comment Share
Grasselli, Federico

Table of Contents 1. Introduction 2. Elements of Quantum Information Theory 3. Introducing Quantum Key Distribution 4. Quantum Conference Key Agreement 5. Quantum Key Distribution with Imperfect Devices 6. Beyond Point-to-Point Quantum Key Distribution 7. Device-Independent Quantum Cryptography 8. Conclusion and Outlook

Edition
-
ISBN/ISSN
9783030643591
Collation
xvii, 152 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 GRA q
Availability1
Add to basket
MARC DownloadCite
cover
Konsep dan strategi keamanan informasi di dunia cyber
Comment Share
Richardus Eko Indrajit

Daftar isi: BAB I Cyber 6: fenomena keamanan informasi dalam dunia cyber BAB II CSIRT/CERT: tim pengawas keamanan internet BAB III Permasalahan mendasar keamanan internet BAB IV Relasi antara dunia nyata dengan dunia cyber dalam hal keamanan BAB V Strategi dan cara hacker dalam menyerang keamanan internet BAB VI Sepuluh aspek keamanan dalam standar internasional BAB VII F…

Edition
--
ISBN/ISSN
9786022622345
Collation
xiv, 259 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 RIC k
Availability1
Add to basket
MARC DownloadCite
cover
The Linux programming interface : a Linux and UNIX system programming handbook
Comment Share
Kerrisk, Michael

The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system. In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system pr…

Edition
1st edition
ISBN/ISSN
9781593272203
Collation
xxix, 1506 hlm.; ilus.; 27 cm.
Series Title
-
Call Number
005.43 KER l
Availability3
Add to basket
MARC DownloadCite
cover
Fundamental of probability: with stochastic processes
Comment Share
Ghahramani, Saeed

Presenting probability in a natural way, this book uses interesting, carefully selected instructive examples that explain the theory, definitions, theorems, and methodology.

Edition
Third Edition
ISBN/ISSN
0131453408
Collation
xvii, 654 hlm.; 24 cm
Series Title
-
Call Number
519.2 GHA f
Availability2
Add to basket
MARC DownloadCite
cover
Introduction to modern cryptography
Comment Share
Katz, JonathanLindell, Yehuda

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.

Edition
1
ISBN/ISSN
9781584885511
Collation
552 hlm.; 23,5 cm
Series Title
-
Call Number
652.8 KAT i
Availability1
Add to basket
MARC DownloadCite
cover
Information warfare and security
Comment Share
Denning, Dorothy E

This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitiv…

Edition
-
ISBN/ISSN
0201433036
Collation
xvii, 522 hlm.; 22 cm
Series Title
-
Call Number
355.343 DEN i
Availability1
Add to basket
MARC DownloadCite
cover
Blackhatonomics: an inside look at the economics of cybercrime
Comment Share
Gragido, WillMolina, DanielPirc, JohnSelby, Nick

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exc…

Edition
1st
ISBN/ISSN
9781597497404
Collation
xliv, 216 hlm.; ilus.; 24 cm
Series Title
-
Call Number
364.16 GRA b
Availability1
Add to basket
MARC DownloadCite
First Page Previous 106 107 108 109 110 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?