Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 41 42 43 44 45 Next Last Page
cover
Computer security
Comment Share
Dony Ariyus

Daftar Isi: BAB I PENDAHULUAN 1.1 Aspek-aspek keamanan komputer 1.2 Aspek-aspek ancaman keamanan 1.3 Metodologi keamanan 1.4 Mendeteksi serangan 1.5 Mencegah 1.6 Lima langkah keamanan Komputer 1.7 Strategi dan dan taktik keamanan komputer 1.8 Password BAB II KEJAHATAN KOMPUTER 2.1 Pendahuluan 2.2 Macam-macam Serangan BAB III DASAR-DASAR KEAMANAN KOMPUTER 3.1 Apa itu Kriptogr…

Edition
Ed. I
ISBN/ISSN
979763163X
Collation
xvi, 381 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DON c
Availability3
Add to basket
MARC DownloadCite
cover
The Antisocial Network : The GameStop Short Squeeze and the Ragtag Group of A…
Comment Share
Ben Mezrich

Named a Best Book of the Year by New York Post! From one of our most innovative and celebrated authors, the definitive take on the wildest story of the year— the David-vs.-Goliath GameStop short squeeze, a tale of fortunes won and lost overnight that may end up changing Wall Street forever. Bestselling author Ben Mezrich offers a gripping, beat-by-beat account of how a loosely affiliate…

Edition
-
ISBN/ISSN
9781538707579
Collation
xi, 288 pages ; 21 cm
Series Title
-
Call Number
332.604 MEZ a
Availability1
Add to basket
MARC DownloadCite
cover
rancang bangun algoritma block cipher gandi28 sebagai alternatif algoritma pe…
Comment Share
Gandi Wibowo

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
-
Availability1
Add to basket
MARC DownloadCite
cover
Authentication: From Passwords to Public Keys
Comment Share
Richard E Smith

Computer access control is an ongoing challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication to confidently associate an identity with a person. Authentication: From Passwords to Public Keys gives readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying…

Edition
-
ISBN/ISSN
9780201615999
Collation
xx, 549 hal : ilus ; 24 cm.
Series Title
-
Call Number
005.8 SMI a
Availability1
Add to basket
MARC DownloadCite
cover
Hacker's Challenge 3 : 20 Brand New Forensic Scenarios and Solutions
Comment Share
David Polino

Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hac…

Edition
Third edition
ISBN/ISSN
9780072263046
Collation
xxviii, 366 hal : ill. ; 23 cm.
Series Title
-
Call Number
005.8 POL h
Availability1
Add to basket
MARC DownloadCite
cover
How Radio Signals Work
Comment Share
Jim Sinclair

This book provides a basic understanding of the way radio signals work-without becoming bogged down with the technicalities. It covers all kinds of radio signal types--including mobile communications, short-wave, satellite, and microwave. No detailed knowledge of electronics or mathematics is required. A-Z coverage of radio signals including satellites, mobile communications, and short-wave rad…

Edition
-
ISBN/ISSN
9780070580589
Collation
x, 234 hal : ill. ; 254cm.
Series Title
-
Call Number
621.384 SIN h
Availability1
Add to basket
MARC DownloadCite
cover
Tindak pidana pres: penyerangan terhadap kepentingan hukum yang dilindungi de…
Comment Share
Adami ChazawiPrija Djatmika,Ardi Ferdian

Tindak pidana pers pada dasarnya merupakan kelompok tindak pidana yang mempublikasikan berita dengan tulisan yang isinya bersifat melawan hukum. Tersebar di KUHP dan di peraturan perundang-undangan lainnya. Penyelesaian kasus pidana pers, tidak bisa dipaksakan dengan UU Pers. Tindak pidana pers juga bukan lex specialis dalam UU Pers. Meskipun dengan alasan terlebih dahulu menggunakan hak jaw…

Edition
-
ISBN/ISSN
9789795384403
Collation
xi, 304 hal: ilus: 21cm
Series Title
-
Call Number
345. 598 ADA t
Availability1
Add to basket
MARC DownloadCite
cover
Kebangkitan nasional Pancasila dan UUD 1945 kunci pemersatu bangsa
Comment Share
Hamid Darmadi

Kehadiran buku ini berupaya mengupas “Semangat kebangkitan Nasional, Pancasila dan Undang-undang Dasar 1945 Kunci Pemersatu Bangsa”. Pancasila sebagai dasar negara dan pandangan hidup bangsa Indonesia untuk mengatur penyelenggaraan negara. Pembukaan UUD Negara Republik Indonesia Tahun 1945 alenia keempat mengamanatkan bahwa bangsa Indonesia memiliki dasar dan pedoman dalam hidup berbangsa d…

Edition
-
ISBN/ISSN
9786028610179
Collation
xiv, 620 hal : 25cm
Series Title
-
Call Number
342.02598 HAM k
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Defense Mechanisms Security, Privacy, and Challenges
Comment Share
Gautam Kumar

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.     The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptogra…

Edition
-
ISBN/ISSN
9780367408831
Collation
xiii, 216 hal : ill. ; 25 cm.
Series Title
-
Call Number
005.8 KUM a
Availability1
Add to basket
MARC DownloadCite
cover
Convolutional Neural Networks untuk Visi Komputer
Comment Share
Sayuti Rahman

Visi komputer merupakan bidang ilmu yang mempelajari dan menafsirkan objek atau informasi pada citra digital. Sebuah kamera cerdas dengan visi komputer dapat memantau objek berbasis visual. Convolutional Neural Network (CNN) merupakan salah satu metode yang cukup populer dan yang paling diminati untuk masalah visi karena tingkat akurasinya yang tinggi. CNN telah berkembang pesat yang ditandai d…

Edition
-
ISBN/ISSN
9786230235399
Collation
x, 132 hal : 25cm
Series Title
-
Call Number
004.22 SAY c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 41 42 43 44 45 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?