Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1861 from your keywords: callnumber=6
First Page Previous 1 2 3 4 5 Next Last Page
cover
Signal and system tird edition
Comment Share
Chi Tsong Chen

Edition
-
ISBN/ISSN
195156617
Collation
xviii, 424 p. : ill. ; 25 cm
Series Title
-
Call Number
621.382 CHE s

Edition
-
ISBN/ISSN
195156617
Collation
xviii, 424 p. : ill. ; 25 cm
Series Title
-
Call Number
621.382 CHE s
Availability1
Add to basket
MARC DownloadCite
cover
Models of scenario building and planning : facing uncertainty and complexity /
Comment Share
Antonio Martelli

"Models of Scenario Building and Planning offers a unique and innovative exploration of the scenario approach. Importance is given to the analysis of the competitors' behaviour. If Models of Scenario Building Planning (MSBP) is there to serve strategy, it should consider with the utmost care the interaction between the concerned company and its competitors as well as its possible consequences. …

Edition
-
ISBN/ISSN
9781137293497 
Collation
xxii, 293 pages ; 23 cm.
Series Title
Bacconi on management series
Call Number
658.401 MAR m
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to telephones and telephone systems.
Comment Share
Noll.. A Mihael

Edition
-
ISBN/ISSN
9781580530002
Collation
xiv, 244 p. : ill. ; 23 cm.
Series Title
-
Call Number
621.385 NOL i

Edition
-
ISBN/ISSN
9781580530002
Collation
xiv, 244 p. : ill. ; 23 cm.
Series Title
-
Call Number
621.385 NOL i
Availability1
Add to basket
MARC DownloadCite
cover
Digital signal processing with Matlab examples, volume 2 : decomposition, rec…
Comment Share
Jose MariaGiron sierra

This is the second volume in a trilogy on modern Signal Processing. The three books provide a concise exposition of signal processing topics, and a guide to support individual practical exploration based on MATLAB programs. This second book focuses on recent developments in response to the demands of new digital technologies. It is divided into two parts: the first part includes four chapters o…

Edition
-
ISBN/ISSN
9789811025372
Collation
xxxix, 913 hal : ilus :25cm
Series Title
-
Call Number
621.382 MAR d
Availability1
Add to basket
MARC DownloadCite
cover
Dedication: the Huawei philosophy of human resource management
Comment Share
Huang, Weiwei

pt. ONE ON VALUE ch. 1 Going All Out to Create Value 1.1.Managing human resources to create value 1.2.Source of value creation 1.3.Elements of value creation 1.4.Cultural factors that support value creation 1.5.Two wheels of value creation 1.6.Reducing reliance on three elements ch. 2 Objectively Assessing Value 2.1.Orientations and principles of value assessments 2.2.Method…

Edition
--
ISBN/ISSN
9781910649510
Collation
334 hal.; 24 cm.
Series Title
--
Call Number
658.3 WEI d
Availability2
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
The CISO's Next Frontier : AI, Post-Quantum Cryptography and Advanced Securit…
Comment Share
Badhwar, Raj

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, n…

Edition
-
ISBN/ISSN
9783030753542
Collation
xliii, 386 hal : 23cm
Series Title
-
Call Number
652.8 BAD c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in MATLAB: creating and programming advanced a…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing …

Edition
-
ISBN/ISSN
9781484273340
Collation
xiii, 194 hal : 23 cm
Series Title
--
Call Number
652.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?