Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Cyber security in parallel and distributed computing: concepts, techniques, a…
Comment Share
Le, DacNhuongKumar, RaghvendraMishra, Brojo KishoreKhari, ManjuChatterjee, Jyotir Moy

The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields …

Edition
-
ISBN/ISSN
9781119488057
Collation
xxix, 261 hlm.; ilus.; 26 cm
Series Title
--
Call Number
005.8 LE c
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Security fundamentals
Comment Share
Panek, Crystal

Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today’s businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational un…

Edition
-
ISBN/ISSN
9781119650669
Collation
xviii, 284 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 PAN s
Availability1
Add to basket
MARC DownloadCite
cover
Management of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…

Edition
Fifth Edition
ISBN/ISSN
9781305501256
Collation
xxii, 650 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WHI m
Availability1
Add to basket
MARC DownloadCite
cover
Buku sakti wireless hacking: temukan dan eksploitasi kelemahan jaringan wirel…
Comment Share
Efvy Zam

Buku Sakti Wireless Hacking ini merupakan edisi revisi dari buku yang berjudul Step by Step Wireless Hacking . Pergantian judul dilakukan karena ada berbagai penambahan materi dan update lainnya. Tujuannya agar menjadi lebih fokus dan tepat sasaran dalam melakukan aksi wireless hacking. Melalui buku ini, Anda mempelajari bagaimana mencari, bahkan mengeksploitasi kelemahan yang ada pada jaringa…

Edition
Pertama
ISBN/ISSN
9786020286167
Collation
x, 235 hlm; ilus; 21 cm
Series Title
--
Call Number
004.66 EFV b
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…

Edition
-
ISBN/ISSN
9781803248745
Collation
816 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Practical Internet of things security: design a security framework for an int…
Comment Share
Russell, BrianVan Duren, Drew

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implem…

Edition
2nd edition
ISBN/ISSN
9781788622844
Collation
374 hlm
Series Title
--
Call Number
005.8 RUS p
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
cover
Wireless communications under hostile jamming: security and efficiency
Comment Share
Li, TongtongSong, TianlongLiang, Yuan

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. Table of contents Part I Wireless Technology and Communications—Explorat…

Edition
-
ISBN/ISSN
9789811308208
Collation
xxi, 219 hlm; 23,5 cm
Series Title
--
Call Number
004.66 LI w
Availability2
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?