Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 723 from your keywords: subject="--"
First Page Previous 11 12 13 14 15 Next Last Page
cover
FPGAs for software programmers
Comment Share
Hannig, FrankZiener, DanielKoch, Dirk

This book makes powerful Field Programmable Gate Array (FPGA) and reconfigurable technology accessible to software engineers by covering different state-of-the-art high-level synthesis approaches (e.g., OpenCL and several C-to-gates compilers). It introduces FPGA technology, its programming model, and how various applications can be implemented on FPGAs without going through low-level hardware …

Edition
-
ISBN/ISSN
9783319264066
Collation
xvii, 327 hlm; 24 cm
Series Title
-
Call Number
621.3815 DIR f
Availability1
Add to basket
MARC DownloadCite
cover
Stress management: a wellness approach
Comment Share
Tummers, Nanette E.

Stress management A wellness approach present practical tools for managing stress in six dimensions: physical, emotional, intellectual, social, spiritual, and environmental. Stress is an unavoidable part of our everyday lives—and some of it can be good. But a lot of stress is unhealthy, and most of us don’t know how to handle it. Ignoring or mishandling unhealthy stress has all sorts of ne…

Edition
Global Edition
ISBN/ISSN
9781450431668
Collation
x, 190 hlm; 28 cm
Series Title
-
Call Number
155.9042 TUM s
Availability2
Add to basket
MARC DownloadCite
cover
IPv6 security
Comment Share
Hogg, ScottVyncke, Eric

Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…

Edition
--
ISBN/ISSN
9781587055942
Collation
xxi, 540 hal.; ilus.; 23 cm
Series Title
Cisco Press networking technology series
Call Number
005.8 HOG i
Availability1
Add to basket
MARC DownloadCite
cover
Cryptology for engineers: an application-oriented mathematical introduction
Comment Share
Schmied, Robert

Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a s…

Edition
-
ISBN/ISSN
9789811208041
Collation
xx, 384 hlm; 23 cm
Series Title
-
Call Number
005.82 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
Comptia linux+ 4E study guide with online labs: xk0-004 exam
Comment Share
Bresnahan, ChristineBlum, Richard

Virtual, hands-on learning labs allow you to apply your technical skills using live hardware and software hosted in the cloud. So Sybex has bundled CompTIA Linux+ labs from Practice Labs, the IT Competency Hub, with our popular CompTIA Linux+ Study Guide, Fourth Edition. Working in these labs gives you the same experience you need to prepare for the CompTIA Linux+ Exam XK0-004 that you would fa…

Edition
4th ed.
ISBN/ISSN
9781119784241
Collation
xi, 863 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.446 BRE c
Availability1
Add to basket
MARC DownloadCite
cover
The hacker and the state: cyber attacks and the new normal of geopolitics
Comment Share
Buchanan, Ben

Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…

Edition
-
ISBN/ISSN
9780674987555
Collation
412 hlm; 22 cm
Series Title
-
Call Number
005.1092 BUC h
Availability1
Add to basket
MARC DownloadCite
cover
Comptia security + guide to network security fundamentals (MindTap Course List)
Comment Share
Ciampa, Mark

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…

Edition
7th ed
ISBN/ISSN
9780357424377
Collation
xviii, 558 hlm.; ilus.; 27,5 cm
Series Title
-
Call Number
005.8 CIA c
Availability1
Add to basket
MARC DownloadCite
cover
Risk analysis and the security survey
Comment Share
Broder, James F.Dwi Prabantini

Termasuk bibliografi dan indeks. CONTENTS:
1. Risk
2. Vulnerability and Threat Identification
3. Risk Measurement
4. Quantifying and Prioritizing Loss Potential
5. Cost/Benefit Analysis
6. Other Risk Analysis Methodologies
7. The Security Survey
8. Management Audit Techniques and the Preliminary Survey
9. The Survey Report
10. Crime…

Edition
Third Edition
ISBN/ISSN
9780750679220
Collation
xviii, 371 hlm.; ilus.; 26 cm.
Series Title
null
Call Number
658.401 BRO r
Availability3
Add to basket
MARC DownloadCite
cover
Applied cyber security and the smart grid: implementing security controls int…
Comment Share
Knapp, Eric DSamani, RajLangill, Joel

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …

Edition
--
ISBN/ISSN
9781597499989
Collation
xxii, 202 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.310285 KNA a
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi visual secret sharing dengan skema Cheng et al pada QR Code Gene…
Comment Share
Prasetyo Adi Wibowo PutroRanu Barta Fahrizal

Indonesia Penggunaan QR Code saat ini semakin marak karena fungsi QR Code untuk information storage, web links, traceability, identification, dan authentication dalam berbagai bidang kehidupan sehari-hari seperti bidang ekonomi, kesehatan, dan ekspedisi barang. Penggunaan QR Code dalam menyimpan informasi khususnya informasi rahasia membuat QR Code rentan untuk dieksploitasi. Eksploitasi QR C…

Edition
--
ISBN/ISSN
--
Collation
xiii, 69 halaman
Series Title
--
Call Number
2020 RAN i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?