Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 716 from your keywords: subject="--"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cryptographic Libraries for Developers
Comment Share
Ed MoyleDiana Kelley

Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familia…

Edition
-
ISBN/ISSN
9781584504092
Collation
-
Series Title
programing series
Call Number
005.1 MOY c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Belajar otodidak windows forensic: untuk semua versi windows
Comment Share
Efvy Zamidra ZamSarjon Defit

Dalam melakukan kegiatan forensik terhadap sistem operasi Windows, kita tidak hanya menganalisa data yang tersimpan dalam hard disk saja, melainkan ada banyak komponen lainnya yang harus diinvestigasi, mulai dari memori (RAM), aplikasi, proses file sistem dan sebagainya. BAB 1 Windows forensic BAB 2 Membongkar identitas komputer BAB 3 Menggali data menggunakan pstools BAB 4 Forensic im…

Edition
Pertama
ISBN/ISSN
9786020476674
Collation
xii, 300 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.43 SAR b
Availability1
Add to basket
MARC DownloadCite
cover
Manajemen pelayanan publik
Comment Share
Hayat

Edition
-
ISBN/ISSN
978-602-402-080-5
Collation
xvii, 225 halaman ; 21 cm
Series Title
-
Call Number
352.63 HAY m

Edition
-
ISBN/ISSN
978-602-402-080-5
Collation
xvii, 225 halaman ; 21 cm
Series Title
-
Call Number
352.63 HAY m
Availability1
Add to basket
MARC DownloadCite
cover
Total quality management in education
Comment Share
EDWARD SALLIS

Deskripsi: Bagaimanakah cara mengembangkan mutu dalam sebuah bisnis atau institusi pendidikan? Jawabannya sangat gampang, yakni dengan membangun mutu yang sudah ada dan mengembangkannya secara terus-menerus. Kehadiran buku ini akan memperkenalkan Anda pada Total Quality Manajemen (TQM) atau Manajemen Mutu Terpadu, dan relevansinya dengan dunia bisnis maupun instansi pendidikan. Hal ini m…

Edition
-
ISBN/ISSN
9799632387
Collation
281 hlm.; 20 cm.
Series Title
-
Call Number
658.4013 SAL t
Availability2
Add to basket
MARC DownloadCite
cover
Computer security
Comment Share
Dony Ariyus

Daftar Isi: BAB I PENDAHULUAN 1.1 Aspek-aspek keamanan komputer 1.2 Aspek-aspek ancaman keamanan 1.3 Metodologi keamanan 1.4 Mendeteksi serangan 1.5 Mencegah 1.6 Lima langkah keamanan Komputer 1.7 Strategi dan dan taktik keamanan komputer 1.8 Password BAB II KEJAHATAN KOMPUTER 2.1 Pendahuluan 2.2 Macam-macam Serangan BAB III DASAR-DASAR KEAMANAN KOMPUTER 3.1 Apa itu Kriptogr…

Edition
Ed. I
ISBN/ISSN
979763163X
Collation
xvi, 381 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DON c
Availability3
Add to basket
MARC DownloadCite
cover
Tales from shakespeare
Comment Share
CharlesLamb, Mary

The Tales from Shakespeare by Charles and Mary Lamb were written to be an 'introduction to the study of Shakespeare', but are much more entertaining than that. All of Shakespeare's best-loved tales, comic and tragic, are retold in a clear and robust style, and their literary quality has made them popular and sought-after ever since their first publication in 1807. This edition contains the deli…

Edition
-
ISBN/ISSN
9781853261404
Collation
278 hlm.; 20 cm
Series Title
--
Call Number
823 CHA t
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to information systems
Comment Share
Rainer, R. KellyPrince, BradCegielski, Casey

The goal of Rainer, Introduction to Information Systems 5e is to teach all business majors, especially undergraduate ones, how to use information technology to master their current or future jobs and to help ensure the success of their organization. To accomplish this goal, this text helps students to become informed users; that is, persons knowledgeable about information systems and informatio…

Edition
Fifth edition
ISBN/ISSN
9781118808559
Collation
xv, 408 hlm.; ilus.; 25 cm
Series Title
--
Call Number
658.4038 RAI i
Availability3
Add to basket
MARC DownloadCite
cover
Data and cyber security technology, use case, and governance
Comment Share
Indra UtoyoHammam RizaDavid DarmawanThomas LaheyJamalul IzzaEdwin LimRohit KumarWendi UsinoRudi Rusdiah Ma

Dari landscape evolusi internet, setelah era PC terjadi peningkatan tajam pengguna internet dan semua kegiatan yang kita lakukan secara online, mendorong peningkatan data secara exponensial, sehingga melahirkan era big data, karena proses datafication, analytics dan data mining oleh Data Driven Entreprise sebagai Data Controller yang mengumpulkan data dari semua kegiatan kita sehari-hari. Co…

Edition
Pertama
ISBN/ISSN
9786239267216
Collation
xx, 240 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 HAM d
Availability3
Add to basket
MARC DownloadCite
cover
Penanganan keamanan jaringan komputer
Comment Share
Bambang Kelana SimponyKyla Salwa Putri DenillaRatu Riqsa Aqidah RidwanMuhammad Ikhsan

Buku ini membahas tiga hal penting yang saling berkaitan dalam lingkup ilmu komputer. Pertama membahas tentang Keamanan Jaringan Komputer dimulai dari pembahasan dasar keamanan jaringan komputer, dasar dalam keamanan sistem informasi, firewall, malware pada jaringan komputer, sampai ke pembahasan keamanan mail server, dan tidak hanya itu membahas juga keamanan pada jaringan nirkabel. Hal kedua …

Edition
Ed.1
ISBN/ISSN
9786236433188
Collation
xi, 112 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAM p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?