Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 467 from your keywords: subject="Security"
1 2 3 4 5 Next Last Page
cover
Performance modeling and analysis of bluetooth networks
Comment Share
Misic, JelenaMisic, Vojislav B.

Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages and disadvantages of performance solutions. Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, …

Edition
-
ISBN/ISSN
9780849331572
Collation
336 hlm.; ilus.; 23 cm
Series Title
-
Call Number
004.62 MIS p
Availability2
Add to basket
MARC DownloadCite
cover
Computer Network Security Theory and Practice
Comment Share
Jie Wang

Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT profession…

Edition
1038 running number
ISBN/ISSN
9787040241624
Collation
xviii, 384 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 WAN c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptographic Security Architecture Design and Verification
Comment Share
Peter Gutmann ·

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular …

Edition
-
ISBN/ISSN
9780387215518
Collation
320 hal
Series Title
-
Call Number
005.8 GUT c
Availability1
Add to basket
MARC DownloadCite
cover
Analisis Static dan Live Mobile Forensic Aplikasi Cloud Storage pada Android …
Comment Share
Ira Rosianal HikmahTiyas YulitaDimas Febriyan Priambodo, M.Cs.Arga Yuda Prasetya

Dengan kemajuan teknologi, layanan cloud semakin mudah diakses, terutama pada perangkat mobile Android. Beberapa aplikasi cloud yang populer termasuk MediaFire, Dropbox, dan Mega. Namun, selain digunakan untuk menyimpan data positif, layanan ini juga sering dimanfaatkan untuk menyimpan materi yang terkait dengan aktivitas kriminal, seperti penyebaran konten bajakan, kekerasan, terorisme, dan ko…

Edition
-
ISBN/ISSN
--
Collation
xviii, 103 hlm
Series Title
-
Call Number
2024 ARG a
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography for Internet and database applications : developing secret and p…
Comment Share
Nick Galbreath

Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applica…

Edition
-
ISBN/ISSN
0471210293
Collation
-
Series Title
-
Call Number
005.8 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and Network Security
Comment Share
Behrouz A. Forouzan

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography in the information society
Comment Share
Ryabko, BorisFionov, Andrey

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain a…

Edition
-
ISBN/ISSN
9789811226168
Collation
2xii, 272 hlm : 23cm
Series Title
--
Call Number
005.82 RYA c
Availability2
Add to basket
MARC DownloadCite
cover
NET security and cryptography
Comment Share
Peter ThorsteinsonArun Ganesh

Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantia…

Edition
-
ISBN/ISSN
9780131008551955499
Collation
xvii, 466 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 THO n
Availability1
Add to basket
MARC DownloadCite
cover
Kajian ketahanan siber: manajemen kerentanan
Comment Share
Nanang TriantoSusila WindartaTaufik NurhidayatNur Annisa Kadarwati FebriyaniDigit Oktacvianto

Tren serangan siber kian hari kian meningkat, tentunya hal ini menimbulkan risiko yang lebih besar terhadap kerentanan pada sistem elektronik. Organisasi perlu menjalankan tindakan proaktif dalam mengelola kerentanan, diawali dengan identifikasi kerentanan, prioritisasi, penanganan, verifikasi dan evaluasi. Sehingga dapat meminimalisasi risiko kerentanan tersebut dieskploitasi oleh pihak yang t…

Edition
-
ISBN/ISSN
9786231075413
Collation
xix, 154 hal: 24 cm
Series Title
-
Call Number
005.8 TAU k
Availability3
Add to basket
MARC DownloadCite
cover
Keamanan siber dan hubungan internasional
Comment Share
Sulistyo

Edition
-
ISBN/ISSN
9786231024800
Collation
iv, 98 hal : 25cm
Series Title
-
Call Number
005.8 SUL k

Edition
-
ISBN/ISSN
9786231024800
Collation
iv, 98 hal : 25cm
Series Title
-
Call Number
005.8 SUL k
Availability3
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?