Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 154 from your keywords: subject="Science"
First Page Previous 11 12 13 14 15 Next Last Page
cover
A statistical test suite for random and pseudorandom number generators for cr…
Comment Share
Banks, DavidBarker, AlaineBassham III, Lawrence EDray, JamesHeckert, AlanLeigh, StefanLevenson, MarkNechvatal, JamesRukhin, AndrewSmid, MilesSoto, JuanVangel, MarkVo, San

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s
Availability2
Add to basket
MARC DownloadCite
cover
RSA security's official guide to cryptography
Comment Share
Burnett, StevePaine, Stephen

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r
Availability1
Add to basket
MARC DownloadCite
cover
Quantum cryptography and secret-key distillation
Comment Share
Assche, Gilles Van

Edition
-
ISBN/ISSN
9780521864855
Collation
xii, 261 hlm.; 25 cm.
Series Title
-
Call Number
005.82 ASS q

Edition
-
ISBN/ISSN
9780521864855
Collation
xii, 261 hlm.; 25 cm.
Series Title
-
Call Number
005.82 ASS q
Availability3
Add to basket
MARC DownloadCite
cover
The Hash function BLAKE
Comment Share
Aumasson, Jean-PhilippeHenzen, LucaMeier, WiliPhan, Raphael C.-W.

CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…

Edition
-
ISBN/ISSN
9783662447567
Collation
Berlin
Series Title
Information Security and Crypography
Call Number
005.8 AUM h
Availability1
Add to basket
MARC DownloadCite
cover
Everyday cryptography : fundamental principles and applications
Comment Share
Martin, Keith M

Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…

Edition
-
ISBN/ISSN
9780199695591
Collation
xxi, 530 hlm.: ilus.; 23 cm.
Series Title
-
Call Number
652.8 MAR e
Availability1
Add to basket
MARC DownloadCite
cover
Principles of laser materials processing
Comment Share
Crisp, JohnElliott, BarryKannatey-Ashibu, ElijahMuhammad Muhsin

Terdapat bibliografi dan indeks. CONTENTS: Chapter 1: Laser Generation Chapter 2: Optical Resonators Chapter 3: Laser Pumping Chapter 4: Rate Equations Chapter 5: Broadening Mechanisms Chapter 6: Beam Modification Chapter 7: Beam Characteristics Chapter 8: Types of Lasers Chapter 9: Beam Delivery Chapter 10: Heat and Fluid Flow During Laser Processing Chapter 11: The Microstructure Chapter 12:…

Edition
null
ISBN/ISSN
9780470177983
Collation
xxvi.; 819 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
621.366 KAN p
Availability1
Add to basket
MARC DownloadCite
cover
Decision support systems and intelligent systems (sistem pendukung keputusan …
Comment Share
Aronson, Jay E.Dwi PrabantiniLiang, Ting-PengTurban, Efraim

Jilid 1. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI:
1. Sistem pendukung manajemen: sebuah tinjauan
2. Sistem pengambilan keputusan, pemodelan dan pendukung
3. Sistem pendukung keputusan: Sebuah tinjauan
4. Pemodelan dan analisis
5. Kecerdasan bisnis: data warehousing, akuisisi data, data mining, analitik bi…

Edition
7 Ed.
ISBN/ISSN
9797318060
Collation
xxii, 802 hlm.; ilus.; 28 cm.
Series Title
null
Call Number
658.4036 TUR d
Availability2
Add to basket
MARC DownloadCite
cover
Decision support systems and intelligent systems (sistem pendukung keputusan …
Comment Share
Aronson, Jay E.Dwi PrabantiniLiang, Ting-PengTurban, Efraim

Jilid 2. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI:
10. Kecerdasan tiruan dan sistem pakar: sistem berbasis-aturan
11. Akuisisi, representasi, dan pertimbangan pengetahuan
12. Sistem cerdas lanjutan
13. Sistem cerdas pada internet
14. Electronic commerce
15. Integrasi, pengaruh, dan masa depan sistem p…

Edition
7 Ed.
ISBN/ISSN
9797318079
Collation
xxii, 802 hlm.; ilus.; 28 cm.
Series Title
null
Call Number
658.4036 TUR d
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 11 12 13 14 15 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?