Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 170 from your keywords: subject="Computer networks"
First Page Previous 11 12 13 14 15 Next Last Page
cover
Konsep & implementasi jaringan dengan Linux Ubuntu
Comment Share
Aldo Sahala

Daftar isi: Pendahuluan Pengenalan jaringan computer Sejarah jaringan computer Pengenalan perangkat keras jaringan Topologi jaringan IP address Instalasi linux Ubuntu Mendapatakan software Ubuntu Instalasi linux untuk networking Konfigurasi penambahan repository Instalasi aplikasi melalui terminal Instalasi aplikasi melalui Ubuntu software center Konfigur…

Edition
Ed. I
ISBN/ISSN
9789792943030
Collation
vii, 152 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.65 ALD k
Availability1
Add to basket
MARC DownloadCite
cover
Security in wireless ad hoc and sensor networks
Comment Share
Cayirci, ErdalRong, Chunming

Termasuk bibliografi dan indeks. Contents Part one . Wireless ad hoc,Sensor and Mesh Networking 1. Introduction 2. Wireless Ad Hoc, Sensor and Mesh Networks 3. The Wireless Medium 4. Medium Access and error Control 5. Routing 6. Reliability, Flow and Congestion Control 7. Other Challenges and Security aspects Part Two. Security in Wireless Ad Hoc, Sensor and Mesh Networking…

Edition
First Edition
ISBN/ISSN
9780470027486
Collation
xii, 257 hlm.; ilus.; 25 cm
Series Title
--
Call Number
005.8 CAY s
Availability1
Add to basket
MARC DownloadCite
cover
Jaringan komputer
Comment Share
Andri Kristanto

Daftar isi: Bab 1. Pendahuluan 1.1 Definisi Jaringan Komputer 1.2 Tujuan Dibangunnya Jaringan Komputer 1.3 Sasaran Terbentuknya Jaringan Komputer 1.4 Manfaat Jaringan Komputer 1.5 Macam Jaringan Komputer Latihan Bab 2. Model Referensi OSI 2.1 Karakteristik Lapisan OSI 2.2 Protokol 2.3 Lapisan-lapisan Model OSI Latihan Bab 3. Physical La…

Edition
Edisi pertama
ISBN/ISSN
9793289333
Collation
xiii, 321 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.65 AND j
Availability1
Add to basket
MARC DownloadCite
cover
Prinsip dasar dan teknologi komunikasi data
Comment Share
Teguh Wahyono

Daftar isi: BAB 1 KONSEP DASAR KOMUNIKASI DATA Data dan komunikasi data Elemen elemen komunikasi data Terminal komunikasi data Kendala-kendala komunikasi data Implementasi komunikasi data Bentuk bentuk komunikasi data BAB 2 DATA DAN SINYAL Data dan sinyal analog Data dan sinyal digital Komponen komponen sinyal Pengkodean data Kode tujuh bit (ASCII) Kode 8 bit (kode EBCDIC) Ko…

Edition
Edisi pertama
ISBN/ISSN
9793289466
Collation
xii, 226 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.6 TEG p
Availability1
Add to basket
MARC DownloadCite
cover
IP routing dan firewall dalam linux
Comment Share
Rahmat Rafiudin

Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …

Edition
Ed. I
ISBN/ISSN
9789797631338
Collation
xi, 187 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.65 RAH i
Availability2
Add to basket
MARC DownloadCite
cover
A guide to computer network security
Comment Share
Kizza, Joseph Migga

Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…

Edition
--
ISBN/ISSN
9781848009165
Collation
xxiv, 472 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 KIZ a
Availability2
Add to basket
MARC DownloadCite
cover
CIW foundations
Comment Share
Miller, Carol

Ceritified Internet Webmaster Exam 1D0-410 Contents Chapter 1. CIW Certification Exams 1 1.1. The exam situation / 2 1.2. Exam layout and design / 3 1.3. Exam focus / 5 1.4. CIW testing software recommendations / 5 1.5. Exam – taking concept / 6 1.6. Question handling strategies / 6 1.7. Judging yourself / 7 1.8. Additional resources / 7 Chapter 2. A General Networking Review …

Edition
--
ISBN/ISSN
15788801659
Collation
xxiii, 418 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.4 MIL C
Availability1
Add to basket
MARC DownloadCite
cover
Solusi cerdas menguasai internetworking packet tracer
Comment Share
Dodi Heriadi

Daftar Isi: Berdendang Bersama Internet Protocol Address-Season 1 0 - Bacalah Dulu 1 - Perkenalan Bermula 2 - Network Addressing-Ipv4 3 - IPV4 Address untuk Maksud Tertentu 4 - Proses Assign Address 5 - Bagian Dari Network Saya, Tidak ? 6 - Berhitung Address 7 - Classless Addressing 8 - KUHIP 9 - Testing Network Layer 10 - Simfoni Network Addressing Berkawan dengan …

Edition
-
ISBN/ISSN
9789792931563
Collation
vi, 440 Hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.65 DOD p
Availability3
Add to basket
MARC DownloadCite
cover
Designing network security
Comment Share
Kaeo, Merike

Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …

Edition
--
ISBN/ISSN
1578700434
Collation
xv, 426 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAE d
Availability1
Add to basket
MARC DownloadCite
cover
Implementing SSL/TLS using cryptography and PKI
Comment Share
Davies, Joshua

Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…

Edition
--
ISBN/ISSN
9780470920411
Collation
xxxii, 663 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?