Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 118 from your keywords: subject="Computer Science"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cybercryptography: applicable cryptography for cyberspace security
Comment Share
Yan, Song Y.

Table of contents 1. Cyberspace Security and Cryptography 2. Mathematical Preliminaries 3. Computational Preliminaries 4. Secret-Key Cryptography 5. Factoring Based Cryptography 6. Logarithm Based Cryptography 7. Elliptic Curve Cryptography 8. Quantum Safe Cryptography 9. Offensive Cryptography 10. Back Matter

Edition
--
ISBN/ISSN
9783319725345
Collation
xi, 436 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 YAN c
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Mengembalikan data yang hilang
Comment Share
Dedik KurniawanJava Creativity

Buku ini tidak hanya membahas cara mengembalikan data yang hilang pada PC dan laptop, tetapi juga mencakup cara mengembalikan foto, video, mp3, kontak, sms, dan pesan Whatsapp yang pernah terhapus pada ponsel android. Sebagai tambahan, diajarkan pula cara membobol dan mengubah password Administrator pada Windows 7, 8, dan 10 yang kadang-kadang harus dilakukan ketika ingin menyelamatkan data dar…

Edition
-
ISBN/ISSN
9786230025006
Collation
xii, 239 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.86 DED m
Availability2
Add to basket
MARC DownloadCite
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
cover
The discrete math workbook: a companion manual using Python
Comment Share
Kurgalin, SergeiBorzunov, Sergei

This practically-focused study guide introduces the fundamentals of discrete mathematics through an extensive set of classroom-tested problems. Each chapter presents a concise introduction to the relevant theory, followed by a detailed account of common challenges and methods for overcoming these. The reader is then encouraged to practice solving such problems for themselves, by tackling a vari…

Edition
-
ISBN/ISSN
9783030422202
Collation
xvii, 500 hlm; 23,5 cm
Series Title
-
Call Number
004.0151 KUR t
Availability1
Add to basket
MARC DownloadCite
cover
Quantum random number generation: theory and practice (quantum science and te…
Comment Share
Kollmitzer, ChristianSchauer, StefanRass, StefanRainer, Benjamin

This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits st…

Edition
-
ISBN/ISSN
9783319725949
Collation
-
Series Title
-
Call Number
512.7 KOL q
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Mihailescu, Marius IulianNita, Stefania Loredana

Table of contents About the Authors About the Technical Reviewer Acknowledgments Part I. Foundations 1. Getting Started in Cryptography and Cryptanalysis 2. Cryptography Fundamentals 3. Mathematical Background and Its Applicability 4. Large Integer Arithmetic 5. Floating-Point Arithmetic 6. New Features in C++20 7. Secure Coding Guidelines 8. Cryptography Libraries in C/C++20 P…

Edition
-
ISBN/ISSN
9781484265857
Collation
xvii, 469 hlm.; ilus.; 25,3 cm
Series Title
-
Call Number
005.262 MIH p
Availability1
Add to basket
MARC DownloadCite
cover
Linux command line and shell scripting bible
Comment Share
Bresnahan, ChristineBlum, Richard

Table of Contents Acknowledgments xi Part I: The Linux Command Line 1 Chapter 1: Starting with Linux Shells 3 Chapter 2: Getting to the Shell 21 Chapter 3: Basic Bash Shell Commands 47 Chapter 4: More Bash Shell Commands 85 Chapter 5: Understanding the Shell 113 Chapter 6: Using Linux Environment Variables 137 Chapter 7: Understanding Linux File Permissions 163 Chapter 8: Managing…

Edition
4th ed.
ISBN/ISSN
9781119700913
Collation
xxxiii, 791 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.43 BLU l
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to modern cryptography
Comment Share
Katz, JonathanLindell, Yehuda

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.

Edition
1
ISBN/ISSN
9781584885511
Collation
552 hlm.; 23,5 cm
Series Title
-
Call Number
652.8 KAT i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?