Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9601 from your keywords:
First Page Previous 91 92 93 94 95 Next Last Page
cover
19 jam belajar cepat arduino
Comment Share
Sigit WasistaSetiawardhanaDelima Ayu Saraswati

Arduino merupakan platform komputasi fisik yang berbasis pada papan input atau output yang menggunakan bahasa pemrograman sendiri. Arduino dapat digunakan untuk mengembangkan objek interaktif mandiri atau dapat dihubungkan ke perangkat lunak pada komputer (seperti flash atau Max/MSP). Arduino ini menggunakan software open source yang dapat dijalankan pada Windows, Mac, dan Linux

Edition
Ed.1
ISBN/ISSN
9786022178620
Collation
xv, 198 hlm.; ilus.; 23 cm
Series Title
--
Call Number
629.8 SET s
Availability1
Add to basket
MARC DownloadCite
cover
Pemrograman javascript untuk aplikasi web
Comment Share
Betha Sidik

Salah satu bahasa Pemrograman yg harus dikuasai oleh pengembang aplikasi berbasis web adalah Javascript. Secara defakto, Javascript adalah satu-satunya bahasa pemrograman yg ada dalam lingkungan browser web, yg didukung oleh semua browser web modern. Menguasai dasar pemrograman javascript menjadi keharusan, karena kita akan dapat mengetahui bagaimana suatu halaman web bisa ditampilkan untuk men…

Edition
-
ISBN/ISSN
9786026232755
Collation
xii, 540 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.262 BET p
Availability1
Add to basket
MARC DownloadCite
cover
Management of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…

Edition
Fifth Edition
ISBN/ISSN
9781305501256
Collation
xxii, 650 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WHI m
Availability1
Add to basket
MARC DownloadCite
cover
Buku sakti wireless hacking: temukan dan eksploitasi kelemahan jaringan wirel…
Comment Share
Efvy Zam

Buku Sakti Wireless Hacking ini merupakan edisi revisi dari buku yang berjudul Step by Step Wireless Hacking . Pergantian judul dilakukan karena ada berbagai penambahan materi dan update lainnya. Tujuannya agar menjadi lebih fokus dan tepat sasaran dalam melakukan aksi wireless hacking. Melalui buku ini, Anda mempelajari bagaimana mencari, bahkan mengeksploitasi kelemahan yang ada pada jaringa…

Edition
Pertama
ISBN/ISSN
9786020286167
Collation
x, 235 hlm; ilus; 21 cm
Series Title
--
Call Number
004.66 EFV b
Availability1
Add to basket
MARC DownloadCite
cover
Panduan karya tulis ilmiah dengan microsoft word 365 dan 2019
Comment Share
Kristian Agung PrasetyoFebrian

Buku ini membahas cara menggunakan heading untuk membuat judul, ,menomori dan mengelola gambar secara otomatis, menomori dan mengelola tabel secara otomatis Daftar Isi: Bab 1 Desain dokumen Bab 2 Mengelola judul bab dan subbab Bab 3 Mengelola gambar Bab 4 Mengelola tabel Bab 5 Mengelola persamaan Bab 6 Mengelola kutipan Bab 7 Pengaturan nomor halaman dan footnote Bab 8 Membuat daftar…

Edition
Pertama
ISBN/ISSN
9786230011108
Collation
xii, 212 hlm; ilus; 21 cm
Series Title
--
Call Number
005.5 KRI p
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…

Edition
-
ISBN/ISSN
9781803248745
Collation
816 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Practical Internet of things security: design a security framework for an int…
Comment Share
Russell, BrianVan Duren, Drew

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implem…

Edition
2nd edition
ISBN/ISSN
9781788622844
Collation
374 hlm
Series Title
--
Call Number
005.8 RUS p
Availability1
Add to basket
MARC DownloadCite
cover
Prosiding- machine learning for cyber security: third international conferenc…
Comment Share
Chen, XiaofengYan, HongyangZhang, XiangliangYan, Qiben

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, …

Edition
-
ISBN/ISSN
9783030622237
Collation
674 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS CHE p
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 91 92 93 94 95 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?