Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 20 from your keywords: subject="Data protection"
First Page Previous 1 2
cover
Advanced persistent threat: understanding the danger and how to protect your …
Comment Share
Cole, Eric

Table of Contents Section I. Understanding the Problem Chapter 1. The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buff…

Edition
--
ISBN/ISSN
9781597499491
Collation
xvi, 290 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL a
Availability1
Add to basket
MARC DownloadCite
cover
New dimensions in privacy law: international and comparative perspectives
Comment Share
Kenyon, Andrew T.Richardson, Megan

Table of Contents 1. New dimensions in privacy: communications technologies, media practices and law Andrew T. Kenyon and Megan Richardson 2. Privacy and freedom of speech Eric Barendt 3. Revisiting the American action for public disclosure of private facts Brian C. Murchison 4. The internet and the private life in Europe: risks and aspirations Yves Poullet and J. Marc Dinant 5. APEC's p…

Edition
1st edition
ISBN/ISSN
9780521187657
Collation
ix, 296 hal.; ilus.; 24 cm
Series Title
--
Call Number
342.0858 KEN n
Availability1
Add to basket
MARC DownloadCite
cover
Managing an information security and privacy awareness and training program
Comment Share
Herold, Rebecca

Table of Contents 1. Brief History of Corporate Information Security and Privacy Awareness and Training Once Upon a Time Welcome to the Information Age Information Security and Privacy Education Current Challenges Bring Changes in Professional Education 2. Why Training and Awareness Are Important Regulatory Requirements Compliance Customer Trust and Satisfaction …

Edition
2nd Edition
ISBN/ISSN
9781439815458
Collation
xxx, 538 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.478 HER m
Availability1
Add to basket
MARC DownloadCite
cover
Privacy in the information age
Comment Share
Cate, Fred H

Contents 1. Introduction 2. Electronic Information Networks 3. Privacy 4. Privacy Regulation in Europe 5. Privacy Regulation in the United States: The Public Sector 6. Privacy Regulation in the United States: The Private Sector 7. Electronic Privacy in the Twenty-First Century App. A. The European Union Directive A…

Edition
--
ISBN/ISSN
0815713169
Collation
xii, 248 hal.; ilus.; 24 cm
Series Title
--
Call Number
342.73 CAT p
Availability1
Add to basket
MARC DownloadCite
cover
Security in computing
Comment Share
Pfleeger, Charles P.Pfleeger, Shari LawrenceMargulies, Jonathan

Contents: Introduction Toolbox : authentication, access control, and cryptography Programs and programming The Web : user side Operating systems Networks Databases Cloud computing Privacy Management and incidents Legal issues and ethics Details of cryptography Emerging topics.

Edition
Fifth Edition
ISBN/ISSN
9780134085043
Collation
xxxiii, 910 hal.: illus. ; 24 cm
Series Title
--
Call Number
005.8 PFL s
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. vanJajodia, Sushil

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Digital watermarking
Comment Share
Bloom, Jeffrey A.Cox, Ingemar J.Miller, Matthew L.

Example Watermarking Systems 1 Introduction 2 Applications and Properties 3 Models of Watermarking 4 Basic Message Coding 5 Watermarking with Side Information 6 Analyzing Errors 7 Using Perceptual Models 8 Robust Watermarking 9 Watermark Security 10 Content Authentication Appendix A: Background Concepts Appendix B: Selected Theoretical Results Appendix C: Source Code Appendix D: N…

Edition
-
ISBN/ISSN
1558607145
Collation
xxv, 539 hlm.; 26 cm.
Series Title
-
Call Number
005.8 COX d
Availability0
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Multimedia content encryption: techniques and applications
Comment Share
Lian, Shiguo

Content list: Chapter 1 Introduction 1.1 Background 1.2 Definition 1.3 History 1.4 Classification 1.5 Book Organization Chapter 2 Performance Requirement of Multimedia Content Encryption 2.1 Introduction 2.2 Security Requirement 2.3 Compression Efficiency 2.4 Encryption Efficiency 2.5 Format Compliance 2.6 Application Suitability Chapter 3 Fundamental Techniques 3.1…

Edition
-
ISBN/ISSN
9781420065275
Collation
xvii, 217 hlm.; 24 cm.
Series Title
-
Call Number
005.82 LIA m
Availability1
Add to basket
MARC DownloadCite
cover
Information security intelligence: cryptographic principles & applications
Comment Share
Calabrese, Thomas

Edition
India Edition
ISBN/ISSN
8131500063
Collation
xiv, 555 hlm.; 24 cm.
Series Title
-
Call Number
005.8 CAL i

Edition
India Edition
ISBN/ISSN
8131500063
Collation
xiv, 555 hlm.; 24 cm.
Series Title
-
Call Number
005.8 CAL i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?