Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Information warfare and security
Comment Share
Denning, Dorothy E

This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitiv…

Edition
-
ISBN/ISSN
0201433036
Collation
xvii, 522 hlm.; 22 cm
Series Title
-
Call Number
355.343 DEN i
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity: engineering a secure information technology organization
Comment Share
Shoemaker, DanSigler, Kenneth

Perangkat lunak sangat penting dan menyebar di dunia modern, tetapi akuisisi, pengembangan, pengoperasian, dan pemeliharaan perangkat lunak dapat melibatkan risiko besar, yang memungkinkan penyerang menyusup ke jutaan komputer setiap tahun. Buku terobosan ini memberikan panduan komprehensif yang unik untuk keamanan perangkat lunak, jauh melampaui pengkodean yang aman hingga menguraikan proses d…

Edition
-
ISBN/ISSN
9781285169903
Collation
xvii, 281 hlm.; ilus.; 28 cm
Series Title
-
Call Number
005.8 SHO c
Availability9
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with coding theory
Comment Share
Washington, Lawrence C.Trappe, Wade

Edisi ketiga ini merupakan revisi dari edisi sebelumnya. Buku Introduction to cryptography: with coding theory edisi ketiga memadukan aspek terapan dan teoretis untuk membangun fondasi yang kuat dalam kriptografi dan keamanan komputer. Penulis menginformasikan cakupan topik yang luas dari sudut pandang matematika, dan mencerminkan tren terbaru dalam bidang kriptografi yang berubah dengan cepat.…

Edition
Third Edition
ISBN/ISSN
9780134860992
Collation
xiii, 621 hlm.; ilus.; 28 cm
Series Title
-
Call Number
005.824 TRA i
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with coding theory
Comment Share
Trappe, WadeWashington, Lawrence C

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error…

Edition
Second Edition
ISBN/ISSN
0131862391
Collation
xiv, 573 hlm.; 22 cm
Series Title
-
Call Number
005.824 TRA i
Availability0
Add to basket
MARC DownloadCite
cover
Extrusion detection: security monitoring for internal intrusions
Comment Share
Bejtlich, Richard

Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…

Edition
-
ISBN/ISSN
0321349962
Collation
xxviii, 385 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8 BEJ e
Availability1
Add to basket
MARC DownloadCite
cover
Gray hat hacking: the ethical hacker's handbook
Comment Share
Linn, RyanEagle, ChrisHarper, AllenRegalado, DanielSims, StephenSpasojevic, BrankoMartinez, LindaBaucom, MichaelHarris, The Late Shon

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, ov…

Edition
Fifth edition
ISBN/ISSN
9781260108415
Collation
640 hlm.; 23 cm
Series Title
-
Call Number
005.84 HAR g
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion detection with snort
Comment Share
Koziol, Jack

Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…

Edition
-
ISBN/ISSN
9781578702817
Collation
xx, 360 hlm; 23 cm
Series Title
-
Call Number
005.8 KOZ i
Availability1
Add to basket
MARC DownloadCite
cover
The manga guide to cryptography
Comment Share
Masaaki MitaniShinichi SatoIdero Hinoki

Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…

Edition
-
ISBN/ISSN
9781593277420
Collation
xi, 233 hlm.; ill.: 24 cm.
Series Title
-
Call Number
652.8 MAS m
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security at Huawei: public affairs and communications department
Comment Share
Zhengfei, Ren

We are heading into in a world everything is connected, everything is sensing, and everything is intelligent.

Edition
-
ISBN/ISSN
-
Collation
166 hlm.; 28 cm
Series Title
-
Call Number
005.8 ZHE c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber law: aspek data privasi menurut hukum internasional, regional, dan nasi…
Comment Share
Sinta Dewi Rosadi

Buku ini ditulis dengan penuh pembaharuan, mengingat telah banyak perkembangan pengaturan hukum pelindungan data privasi baik secara internasional, regional maupun nasional. Rejim pengaturan data privasi telah berkembang dengan pesat baik di lingkup pemerintahan maupun swasta yang merupakan pihak yang memiliki kewajiban untuk dapat lebih melindungi data privasi individu, fenomena ini didorong d…

Edition
-
ISBN/ISSN
9786236232354
Collation
xii, 192 hlm.; ilus.; 24 cm
Series Title
-
Call Number
343 SIN c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?