Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 21 22 23 24 25 Next Last Page
cover
Square attack pada Midori64
Comment Share
Santi IndarjaniDwi Baskara Wardhana

Midori64 merupakan algoritme block cipher yang dipublikasikan oleh Banik et al (2015). Banik et al mengklaim bahwa Midori64 aman terhadap integral attack. Salah satu jenis integral attack adalah square attack. Berdasarkan hal tersebut maka dalam penelitian ini dilakukan square attack pada Midori64 dengan menggunakan semua kemungkinan jumlah dan posisi nibble aktif serta menganalisis ketahanan M…

Edition
null
ISBN/ISSN
null
Collation
ix, 66 hlm.
Series Title
null
Call Number
2018 DWI s
Availability2
Add to basket
MARC DownloadCite
cover
Possible minds : twenty-five ways of looking at AI
Comment Share
John Brockman

"Science world luminary John Brockman assembles twenty-five of the most important scientific minds, people who have been thinking about the field artificial intelligence for most of their careers, for an unparalleled round-table examination about mind, thinking, intelligence and what it means to be human"-- Provided by publisher.

Edition
-
ISBN/ISSN
9780525557999
Collation
xxvi, 293 pages ; 24 cm
Series Title
-
Call Number
006.3 BRO e
Availability0
Add to basket
MARC DownloadCite
cover
C: How to Program 6th Edition
Comment Share
Paul DeitelHarvey M. Deitel

C How to Program, 6e, is ideal for introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology. This text provides a valuable reference for programmers and anyone interested in learning the C programming language. The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object…

Edition
-
ISBN/ISSN
9780137059669
Collation
998 hal: ilus : 25 cm
Series Title
-
Call Number
005.262 DEI c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Cryptography and Machine Learning : Fourth International Sympo…
Comment Share
Dolev, ShlomiSachin;Weiss, GeraVladimir;Lodha,Shlomi;Kolesnikov

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber secur…

Edition
-
ISBN/ISSN
9783030497859
Collation
xii, 253 hal : 23cm
Series Title
-
Call Number
005.8 DOL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
Embedded Systems Architecture : Explore Architectural Concepts, Pragmatic Des…
Comment Share
Lacamera, Daniele

Edition
-
ISBN/ISSN
9781788830287
Collation
vi, 305 hal : 23 cm
Series Title
-
Call Number
004.22 LAC e

Edition
-
ISBN/ISSN
9781788830287
Collation
vi, 305 hal : 23 cm
Series Title
-
Call Number
004.22 LAC e
Availability1
Add to basket
MARC DownloadCite
cover
Designing Embedded Hardware
Comment Share
Catsoulis, John

Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of …

Edition
-
ISBN/ISSN
9780596520939
Collation
xvi, 370 hal : 23cm
Series Title
-
Call Number
004.16 CAT d
Availability1
Add to basket
MARC DownloadCite
cover
Demystifying Cryptography with OpenSSL 3. 0 : Discover the Best Techniques to…
Comment Share
Khlebnikov, AlexeiAdolfsen, Jarle

Edition
-
ISBN/ISSN
9781800562226
Collation
xx. 320 : 23cm
Series Title
-
Call Number
005.824 KHL d

Edition
-
ISBN/ISSN
9781800562226
Collation
xx. 320 : 23cm
Series Title
-
Call Number
005.824 KHL d
Availability1
Add to basket
MARC DownloadCite
cover
Authentication and Access Control : Practical Cryptography Methods and Tools
Comment Share
Boonkrong, Sirapat

Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available …

Edition
-
ISBN/ISSN
9781484265703
Collation
xvii, 230 hal :23cm
Series Title
-
Call Number
005.8 BOO a
Availability1
Add to basket
MARC DownloadCite
cover
The CISO's Next Frontier : AI, Post-Quantum Cryptography and Advanced Securit…
Comment Share
Badhwar, Raj

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, n…

Edition
-
ISBN/ISSN
9783030753542
Collation
xliii, 386 hal : 23cm
Series Title
-
Call Number
652.8 BAD c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?