Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 159 from your keywords: subject="security measures"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Multimedia information hiding technologies and methodologies for controlling …
Comment Share
Kondo, Kazuhiro

Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …

Edition
--
ISBN/ISSN
9781466622173
Collation
xxii, 473 hal.; ilus.; 29 cm
Series Title
--
Call Number
005.82 KON m
Availability1
Add to basket
MARC DownloadCite
cover
From CIA to APT: an introduction to cyber security
Comment Share
Amoroso, Edward G.

--

Edition
--
ISBN/ISSN
9781522074946
Collation
112 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 AMO f
Availability1
Add to basket
MARC DownloadCite
cover
Information hiding text in image: encryption
Comment Share
Hasan, HaithamKareem, Sameem AbdulJaleel, Jane

Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…

Edition
--
ISBN/ISSN
9783659288487
Collation
xv, 88 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 HAS i
Availability1
Add to basket
MARC DownloadCite
cover
Cyberspace safety and security: 5th International Symposium, CSS 2013, Zhangj…
Comment Share
Wang, GuojunRay, IndrakshiFeng, DengguoRajarajan, Muttukrishnan

Table of contents 1. A Crawler Guard for Quickly Blocking Unauthorized Web Robot 2. Privacy Preserving for Location-Based Services Using Location Transformation 3. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux 4. Multiple-Bank E-Cash without Random Oracles 5. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy 6. Preserving User Priv…

Edition
--
ISBN/ISSN
9783319035833
Collation
xxvi, 480 hal.; ilus.; 24 cm
Series Title
--
Call Number
R005.8 WAN c
Availability0
Add to basket
MARC DownloadCite
cover
The cybersecurity to English dictionary
Comment Share
Meeuwisse, Raef

Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…

Edition
Third edition
ISBN/ISSN
9781911452102
Collation
xii, 106 hal.; 20 cm
Series Title
--
Call Number
R005.803 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
New directions of modern cryptography
Comment Share
Cao, Zhenfu

Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…

Edition
--
ISBN/ISSN
9781466501386
Collation
xv, 384 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CAO n
Availability1
Add to basket
MARC DownloadCite
cover
Digital watermarking and steganography: fundamentals and techniques
Comment Share
Shih, Frank Y.

Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …

Edition
Second Edition
ISBN/ISSN
9781498738767
Collation
xxii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SHI d
Availability0
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security basics: protect your organization by applying the fundamentals
Comment Share
Franke, Don

Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …

Edition
--
ISBN/ISSN
9781522952190
Collation
98 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FRA c
Availability1
Add to basket
MARC DownloadCite
cover
Security for web services and service-oriented architectures
Comment Share
Bertino, ElisaMartino, LorenzoPaci, FedericaSquicciarini, Anna

Contents: 1 Introduction 2 Web service technologies, principles, architectures, and standards 3 Web services threats, vulnerabilities, and countermeansures 4 Standards for web services security 5 Digital identity management and trust negotiation 6 Access control for web services 7 Secure publishing tecniques 8 Access control for business processes 9 Emerging research trends

Edition
--
ISBN/ISSN
9783540877417
Collation
xii, 226 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BER s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?