Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 153 from your keywords: subject="Cryptography"
1 2 3 4 5 Next Last Page
cover
Kriptografi edisi kedua
Comment Share
Rinaldi Munir

Daftar isi: Bab 1 Pengantar kriptografi Bab 2 Landasan matematika untuk kriptografi Bab 3 Serangan terhadap kriptografi Bab 4 Kriptografi Klasik Bab 5 Kriptografi Modern Bab 6 Review beberapa cipher alir dan cipher blok Bab 7 Kriptografi kunci-publik Bab 8 Pembangkit bilangan acak Bab 9 Fungsi hash Bab 10 Tanda-tangan digital Bab 11 Elliptic curve cryptography Bab 12 Inf…

Edition
Edisi kedua
ISBN/ISSN
9786237131052
Collation
xviii, 644 hal.; ilus.; 24 cm
Series Title
--
Call Number
652.8 RIN k
Availability7
Add to basket
MARC DownloadCite
cover
Cryptographic Security Architecture Design and Verification
Comment Share
Peter Gutmann ·

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular …

Edition
-
ISBN/ISSN
9780387215518
Collation
320 hal
Series Title
-
Call Number
005.8 GUT c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography for Internet and database applications : developing secret and p…
Comment Share
Nick Galbreath

Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applica…

Edition
-
ISBN/ISSN
0471210293
Collation
-
Series Title
-
Call Number
005.8 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and Network Security
Comment Share
Behrouz A. Forouzan

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography in the information society
Comment Share
Ryabko, BorisFionov, Andrey

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain a…

Edition
-
ISBN/ISSN
9789811226168
Collation
2xii, 272 hlm : 23cm
Series Title
--
Call Number
005.82 RYA c
Availability2
Add to basket
MARC DownloadCite
cover
NET security and cryptography
Comment Share
Peter ThorsteinsonArun Ganesh

Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantia…

Edition
-
ISBN/ISSN
9780131008551955499
Collation
xvii, 466 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 THO n
Availability1
Add to basket
MARC DownloadCite
cover
Java untuk kriptografi
Comment Share
Sianipar, R.H.

Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…

Edition
Ed. I
ISBN/ISSN
9789792958836
Collation
vi, 218 hal.; ilus.; 23 cm + 1 CD
Series Title
--
Call Number
005.82 SIA j
Availability9
Add to basket
MARC DownloadCite
cover
Real world cryptography
Comment Share
Wong, David

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…

Edition
-
ISBN/ISSN
9781638350842
Collation
xxv, 370 hlm :23 cm
Series Title
--
Call Number
005.82 WON r
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Security, Privacy, and Applied Cryptography Engineering : 12th International …
Comment Share
Batina, LejlaMondal, MainackPicek, Stjepan

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key crypt…

Edition
-
ISBN/ISSN
9783031228292
Collation
340 hal ; 23cm
Series Title
-
Call Number
005.8 BAT s
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?