Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 33 from your keywords: subject="Cyber security"
First Page Previous 1 2 3 4 Next Last Page
cover
Cybercryptography: applicable cryptography for cyberspace security
Comment Share
Yan, Song Y.

Table of contents 1. Cyberspace Security and Cryptography 2. Mathematical Preliminaries 3. Computational Preliminaries 4. Secret-Key Cryptography 5. Factoring Based Cryptography 6. Logarithm Based Cryptography 7. Elliptic Curve Cryptography 8. Quantum Safe Cryptography 9. Offensive Cryptography 10. Back Matter

Edition
--
ISBN/ISSN
9783319725345
Collation
xi, 436 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 YAN c
Availability1
Add to basket
MARC DownloadCite
cover
Advances in cyber security: principles, techniques, and applications
Comment Share
Chen, XiaofengLi, Kuan-ChingSusilo, Willy

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authenticati…

Edition
--
ISBN/ISSN
9789811314827
Collation
xix, 255 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 LI a
Availability1
Add to basket
MARC DownloadCite
cover
Desain gamifikasi sebagai media pembelajaran untuk memotivasi pelajar dalam m…
Comment Share
Setiyo CahyonoRahmat PurwokoMonica Christy NataliaR Budiarto Hadiprakoso

Abstrak: Perkembangan serangan phishing terus berkembang tiap tahunnya. Berdasarkan data dari perusahaan cyber security Kaspersky didapati bahwa serangan phishing sudah menyasar sektor akademik dan laporan hasil monitoring keamanan siber BSSN 2021 menunjukkan bahwa sektor akademik menempati posisi kedua sebaran phishing terbanyak di Indonesia. Hasil survei yang dilakukan oleh APJII tahun 2022…

Edition
--
ISBN/ISSN
--
Collation
xiii, 56 halaman
Series Title
--
Call Number
2023 MON d
Availability2
Add to basket
MARC DownloadCite
cover
Network security dan cyber security: teori dan praktik CISCO CCNA, linux, win…
Comment Share
Iwan SofanaRifkie Primartha

Cybersecurity adalah kegiatan yang menjamin kerahasiaan, keutuhan dan ketersediaan informasi sehingga tetap aman. Keamanan siber juga merupakan upaya, aktivitas, atau tindakan multi pihak untuk melindungi akses jaringan, sistem, program, dan data dari berbagai ancaman siber atau akses ilegal Daftar Isi: BAGIAN 1 BAB 1. Pendahuluan Security BAB 2. Network Security BAB 3. Menyiapkan LAB Pr…

Edition
Cet. I
ISBN/ISSN
9786237131038
Collation
xiv, 506 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 IWA n
Availability3
Add to basket
MARC DownloadCite
cover
Cyber security in parallel and distributed computing: concepts, techniques, a…
Comment Share
Le, DacNhuongKumar, RaghvendraMishra, Brojo KishoreKhari, ManjuChatterjee, Jyotir Moy

The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields …

Edition
-
ISBN/ISSN
9781119488057
Collation
xxix, 261 hlm.; ilus.; 26 cm
Series Title
--
Call Number
005.8 LE c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity blue team toolkit
Comment Share
Tanner, Nadean H.

As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner’s wide array of experience from teaching at a University to w…

Edition
-
ISBN/ISSN
9781119552932
Collation
xxiii, 262 hlm.; ilus.: 24 cm
Series Title
--
Call Number
005.8 TAN c
Availability2
Add to basket
MARC DownloadCite
cover
Cybersecurity essentials
Comment Share
Brooks, Charles J.Grow, ChristopherCraig, PhilipShort, Donald

Table of contents PART I SECURING THE INFRASTRUCTURE Chapter 1 Infrastructure Security in the Real World Chapter 2 Understanding Access-Control and Monitoring Systems Chapter 3 Understanding Video Surveillance Systems Chapter 4 Understanding Intrusion-Detection and Reporting Systems Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises PART II SECURING LOCA…

Edition
-
ISBN/ISSN
9781119362395
Collation
xxvi, 758 hlm.; ill.: 23 cm
Series Title
--
Call Number
005.8 BRO c
Availability2
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity manager's guide: the art of building your security program
Comment Share
Barnum, Todd

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building an…

Edition
-
ISBN/ISSN
9781492076216
Collation
vii, 167 hlm; 22,5 cm
Series Title
-
Call Number
005.8 BAR c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity: engineering a secure information technology organization
Comment Share
Shoemaker, DanSigler, Kenneth

Perangkat lunak sangat penting dan menyebar di dunia modern, tetapi akuisisi, pengembangan, pengoperasian, dan pemeliharaan perangkat lunak dapat melibatkan risiko besar, yang memungkinkan penyerang menyusup ke jutaan komputer setiap tahun. Buku terobosan ini memberikan panduan komprehensif yang unik untuk keamanan perangkat lunak, jauh melampaui pengkodean yang aman hingga menguraikan proses d…

Edition
-
ISBN/ISSN
9781285169903
Collation
xvii, 281 hlm.; ilus.; 28 cm
Series Title
-
Call Number
005.8 SHO c
Availability9
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?