Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Fundamental of PHP security
Comment Share
Wiwit Siswoutomo

Daftar isi: Bab 1 Validasi input 1.1 Validasi angka 1.2 Validasi string 1.3 Input yang membingungkan 1.4 Problema file Bab 2 Cross-site scripting 2.1 Enconding solution 2.2 Menangani atribut 2.3 Mengakali filter 2.4 Strip-tags () 2.5 Environtmen variables Bab 3 SQL injection 3.1 Magic quates 3.2 Ketepatan tipe data 3.3 Penyerangan like 3.4 SQL error handling 3.5 File inc…

Edition
Pertama
ISBN/ISSN
9789792705270
Collation
vii, 207 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 WIW f
Availability1
Add to basket
MARC DownloadCite
cover
Kumpulan tool proteksi PC dan jaringan
Comment Share
Oktaviani Hastu Sudiyarto

Daftar isi: Bab I Aplikasi Antivirus Bab II Aplikasi Imaging System Bab III Aplikasi File Recovery Bab IV Aplikasi Dekstop Locker Bab V Aplikasi Perawatan Sistem Bab VI Aplikasi proteksi folder Bab VII Aplikasi Pop up blocker Bab VIII Aplikasi firewall Bab IX Aplikasi

Edition
Ed. I
ISBN/ISSN
9797630641
Collation
x, 258 hlm.; ilus.; 23 cm
Series Title
Seri Populer
Call Number
005.8 OKT k
Availability1
Add to basket
MARC DownloadCite
cover
Advances in security technology: International conference, SecTech 2008, and …
Comment Share
Kim, Haeng-konKim, Tai-hoonKiumi, Akingbehin

Contents: Security analysis of a novel elliptic curve dynamic access control system VoIP SPAM response system adopting multi-leveled anti-SPIT solutions Feature extraction for IRIS recognition Bidirectional quantum secure direct communication based on entanglement Study and implementation of selinux-like access control mechanism based on linux Research on streaming dta integration syste…

Edition
--
ISBN/ISSN
9783642102394
Collation
xii, 161 hlm.; ilus.; 24 cm
Series Title
Communications in Computer and Information Science
Call Number
R005.8 KIM a
Availability1
Add to basket
MARC DownloadCite
cover
Pengamanan server menggunakan SMS
Comment Share
Aidil ChendramataAdhityo Priyambodo

Daftar isi: 1. Pendahuluan 2. Skema Sistem Notifikasi 3. Pemasangan 3.1 Kebutuhan Pemasangan 3.2 Pemasangan Melalui Kode Sumber 3.3 Pemasangan Melalui Repositori 4. Konfigurasi Kannel 5. Memulai kannel 5.1 Memulai Kannel Ala Debian 5.2 Memulai Kannel Kode Sumber 6. Uji Penggunaan Kannel 7. Membuat Ping Sederhana Sebagai Contoh Kasus 8. Membuat Pemonitoran Sederhana Dengan SNMP …

Edition
Cetakan pertama
ISBN/ISSN
--
Collation
viii, 68 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID p
Availability1
Add to basket
MARC DownloadCite
cover
Keamanan multimedia: konsep dan aplikasi
Comment Share
Dony Ariyus

Daftar isi: 1. PENDAHULUAN 1.1 Pendahuluan 1.2 Multimedia 1.3 Masalah keamanan 1.4 Ancaman keamanan 1.5 Aspek aspek keamanan komputer 2. PEMAHAMAN DASAR KEAMANAN MULTIMEDIA 2.1 Pendahuluan 2.2 Cryptography 2.3 Steganography 2.4 Digital watermarking 3. STEGANOGRAPHY 3.1 Pendahuluan 3.2 Sejarah steganography 3.3 Teknik steganography 3.4 Embeding methods 3.5 Method leaset 3…

Edition
Ed. I
ISBN/ISSN
9789792902891
Collation
xii, 338 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 DON k
Availability2
Add to basket
MARC DownloadCite
cover
Protecting information: from classical error correction to quantum cryptography
Comment Share
Loepp, SusanWootters, William K.

Contents 1. Cryptography: an overview 1.1 Elementaru ciphers 1.2 Enigma 1.3 A review of modular arithmetic and Zn 1.4 The hill cipher 1.5 Attscks on the hill cipher 1.6 Feistel cipher and DES 1.7 A word about AES 1.8 Diffie-hellman public key exchange 1.9 RSA 1.10 Public key exchanges with a group 1.11 Public key exchange using elliptic curve 2. Quantum mechanics 2.1 Photo pol…

Edition
--
ISBN/ISSN
9780521827409
Collation
xv, 287 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 LOE p
Availability3
Add to basket
MARC DownloadCite
cover
Exploiting software: how to break code
Comment Share
Hoglund, GregMcGraw, Gary

Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits

Edition
--
ISBN/ISSN
9780201786958
Collation
xxii, 471 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 HOG e
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptanalysis: breaking ciphers in the real world
Comment Share
Stamp, MarkLow, Richard M.

Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra

Edition
--
ISBN/ISSN
9780470114865
Collation
xix, 401 hlm.; 24 cm.
Series Title
--
Call Number
005.82 STA a
Availability14
Add to basket
MARC DownloadCite
cover
A classical introduction to cryptography exercise book
Comment Share
Baigneres, ThomasJunod, PascalMonnerat, JeanVaudenay, SergeYi, Lu

contents: - Prehistory of Cryptography - Conventional Cryptography - Dedicated Conventional Cryptographic Primitives - Conventional Security Analysis - Security Protocols with Conventional Cryptography - Algorithmic Algebra - Algorithmic Number Theory - Elements of Complexity Theory - Public Key Cryptography - Digital Signatures - Cryptographic Protocols - From Cryptography to Com…

Edition
--
ISBN/ISSN
9780387279343
Collation
xiv, 254 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 BAI c
Availability1
Add to basket
MARC DownloadCite
cover
IP routing dan firewall dalam linux
Comment Share
Rahmat Rafiudin

Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …

Edition
Ed. I
ISBN/ISSN
9789797631338
Collation
xi, 187 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.65 RAH i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?