Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Hardware security and trust: design and deployment of integrated circuits in …
Comment Share
Sklavos, NicolasRegazzoni, FrancescoChaves, RicardoDi Natale, Giorgio

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…

Edition
-
ISBN/ISSN
9783319443188
Collation
254 hlm
Series Title
--
Call Number
005.8 SKL h
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Security Incidents and Response Against Cyber Attacks
Comment Share
Bhardwaj, AkashdeepSapra, Varun

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…

Edition
-
ISBN/ISSN
9783030691745
Collation
xiv, 246 hal : 23cm
Series Title
-
Call Number
005.8 BHA s
Availability1
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security and Intelligent Analytics
Comment Share
Verma, AbhishekVerma, Abhishek;Kumar, JitendraValentina EmiliaHari Mohan;Singh,

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a
Availability1
Add to basket
MARC DownloadCite
cover
Agile Security Operations : Engineering for Agility in Cyber Defense, Detecti…
Comment Share
Hettema, Hinne

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a
Availability1
Add to basket
MARC DownloadCite
cover
Security, Privacy, and Applied Cryptography Engineering : 12th International …
Comment Share
Batina, LejlaMondal, MainackPicek, Stjepan

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key crypt…

Edition
-
ISBN/ISSN
9783031228292
Collation
340 hal ; 23cm
Series Title
-
Call Number
005.8 BAT s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Threat Intelligence : The No-Nonsense Guide for CISOs and Security Mana…
Comment Share
Aaron Robert

Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develo…

Edition
-
ISBN/ISSN
9781484272206
Collation
xxii, 205 hal : 23cm
Series Title
-
Call Number
005.8 ROB c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
cover
Analisis Protokol Autentikasi Nai-Wei dan Alexander Menggunakan AVISPA
Comment Share
Sepha SiswantyoYeni FaridaNia YuliantiAndre Irawan

BLE-Based Authentication Protocol termasuk dalam mutual authentication protocol antara entitas pengguna yang direpresentasikan dengan Wearable Device (WD), Wearable Payment Counter (WP counter), dan server atau pihak ketiga tepercaya yang di desain oleh Nai-Wei dan Alexander pada tahun 2020. BLE Authentication protocol ditujukan untuk menjamin autentikasi pada sistem pembayaran mikro berbasis B…

Edition
-
ISBN/ISSN
--
Collation
xv, 43 hal
Series Title
-
Call Number
2024 AND a
Availability2
Add to basket
MARC DownloadCite
cover
Perancangan Modul Praktikum dan Laboratorium Virtual menggunakan Cloud sebaga…
Comment Share
Hermawan SetiawanRahmat PurwokoSeptia Ulfa SunaringtyasMuhammad Sofyan Arif Harumnanda

Berdasarkan rekapitulasi insiden tahun 2023 oleh Badan Siber dan Sandi Negara (BSSN), terdapat peningkatan 30% notifikasi insiden dibandingkan tahun 2022. Dalam upaya respon insiden tersebut, Kementerian Pendidikan, Kebudayaan, Riset dan Teknologi (Kemendikbudristek) sebagai lembaga kementerian pemerintah Indonesia yang berfokus pada penyedia kebutuhan pendidikan di Indonesia memiliki tim respo…

Edition
-
ISBN/ISSN
--
Collation
-
Series Title
-
Call Number
2024 MUH p
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?