Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 22 from your keywords: subject="Data protection"
First Page Previous 1 2 3 Next Last Page
cover
Privacy, information, and technology
Comment Share
Solove, Daniel J.Schwartz, Paul M.

Contents: 1. Introduction Information privacy, technology, and the law Information privacy law : origins and types Perspectives on privacy 2. Privasi and law enforcement The Fourth Amendment and emerging technology Federal electronic surveillance law Digital searches and seizures National security and foreign intelligence 3. Privacy and goverenment records and d…

Edition
Third Edition
ISBN/ISSN
9780735510425
Collation
xxiii, 576 hal.; ilus.; 26 cm
Series Title
Aspen electives series
Call Number
342.73 SOL p
Availability1
Add to basket
MARC DownloadCite
cover
Information Technology Risk Management in enterprise Environments:a review in…
Comment Share
Jane KounsDaniel Minoli

CONTENTS: 1. Information security risk management imperatives and opportunities 2. Information security risk management defined 3. Information security risk management standards 4. A survey of available information security risk management methods and tools 5. Methodologies examples : COBIT and OCTAVE 6. Risk management issues and organization specifics 7. Assessing organization an…

Edition
first
ISBN/ISSN
9780471762546
Collation
xvii,421hal.;ilus.;24cm
Series Title
null
Call Number
658.4 KOU i
Availability1
Add to basket
MARC DownloadCite
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
New dimensions in privacy law: international and comparative perspectives
Comment Share
Kenyon, Andrew T.Richardson, Megan

Table of Contents 1. New dimensions in privacy: communications technologies, media practices and law Andrew T. Kenyon and Megan Richardson 2. Privacy and freedom of speech Eric Barendt 3. Revisiting the American action for public disclosure of private facts Brian C. Murchison 4. The internet and the private life in Europe: risks and aspirations Yves Poullet and J. Marc Dinant 5. APEC's p…

Edition
1st edition
ISBN/ISSN
9780521187657
Collation
ix, 296 hal.; ilus.; 24 cm
Series Title
--
Call Number
342.0858 KEN n
Availability1
Add to basket
MARC DownloadCite
cover
Managing an information security and privacy awareness and training program
Comment Share
Herold, Rebecca

Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …

Edition
2nd Edition
ISBN/ISSN
9781439815458
Collation
xxx, 538 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.478 HER m
Availability1
Add to basket
MARC DownloadCite
cover
Privacy in the information age
Comment Share
Cate, Fred H

Contents 1. Introduction 2. Electronic Information Networks 3. Privacy 4. Privacy Regulation in Europe 5. Privacy Regulation in the United States: The Public Sector 6. Privacy Regulation in the United States: The Private Sector 7. Electronic Privacy in the Twenty-First Century App. A. The European Union Directive A…

Edition
--
ISBN/ISSN
0815713169
Collation
xii, 248 hal.; ilus.; 24 cm
Series Title
--
Call Number
342.73 CAT p
Availability1
Add to basket
MARC DownloadCite
cover
Security in computing
Comment Share
Pfleeger, Charles P.Pfleeger, Shari LawrenceMargulies, Jonathan

Contents: Introduction Toolbox : authentication, access control, and cryptography Programs and programming The Web : user side Operating systems Networks Databases Cloud computing Privacy Management and incidents Legal issues and ethics Details of cryptography Emerging topics.

Edition
Fifth Edition
ISBN/ISSN
9780134085043
Collation
xxxiii, 910 hal.: illus. ; 24 cm
Series Title
--
Call Number
005.8 PFL s
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Jajodia, SushilTilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Digital watermarking
Comment Share
Bloom, Jeffrey A.Cox, Ingemar J.Miller, Matthew L.

Example Watermarking Systems 1 Introduction 2 Applications and Properties 3 Models of Watermarking 4 Basic Message Coding 5 Watermarking with Side Information 6 Analyzing Errors 7 Using Perceptual Models 8 Robust Watermarking 9 Watermark Security 10 Content Authentication Appendix A: Background Concepts Appendix B: Selected Theoretical Results Appendix C: Source Code Appendix D: N…

Edition
-
ISBN/ISSN
1558607145
Collation
xxv, 539 hlm.; 26 cm.
Series Title
-
Call Number
005.8 COX d
Availability0
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?