Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 85 from your keywords: subject="Encryption"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cryptography apocalypse: preparing for the day when quantum computing breaks …
Comment Share
Grimes, Roger A.

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way …

Edition
--
ISBN/ISSN
9781119618195
Collation
xxiv, 248 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 GRI c
Availability1
Add to basket
MARC DownloadCite
cover
Advances in cyber security: principles, techniques, and applications
Comment Share
Chen, XiaofengLi, Kuan-ChingSusilo, Willy

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authenticati…

Edition
--
ISBN/ISSN
9789811314827
Collation
xix, 255 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 LI a
Availability1
Add to basket
MARC DownloadCite
cover
Skema autentikasi pengguna extended self-adaptive honey encryption (XSHE) men…
Comment Share
Hermawan SetiawanGirinotoHerman KabettaAdek Muhammad Zulkham Ristiawan Kertanegara

Abstrak: Usaha untuk meningkatkan keamanan sistem informasi melalui autentikasi pengguna yang aman menjadi penting untuk memastikan privasi pengguna sekaligus memverifikasi akses yang sah ke layanan. Autentikasi berbasis kata sandi atau password based encryption (PBE) merupakan metode yang paling banyak diterima dan hemat biaya, tetapi rentan terhadap serangan password-cracking dan database l…

Edition
--
ISBN/ISSN
--
Collation
xviii, 85 halaman
Series Title
--
Call Number
2023 ADE s
Availability2
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Mihailescu, Marius IulianNita, Stefania Loredana

Table of contents About the Authors About the Technical Reviewer Acknowledgments Part I. Foundations 1. Getting Started in Cryptography and Cryptanalysis 2. Cryptography Fundamentals 3. Mathematical Background and Its Applicability 4. Large Integer Arithmetic 5. Floating-Point Arithmetic 6. New Features in C++20 7. Secure Coding Guidelines 8. Cryptography Libraries in C/C++20 P…

Edition
-
ISBN/ISSN
9781484265857
Collation
xvii, 469 hlm.; ilus.; 25,3 cm
Series Title
-
Call Number
005.262 MIH p
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi dan analisis layanan keamanan skema inner product functional enc…
Comment Share
Sri RosdianaAnnisa Dini HandayaniSa'aadah Sajjana CaritaArni Yulia

Enkripsi menjadi salah satu cara untuk mengamankan data, sehingga hanya dapat diakses oleh pihak yang dituju. Terdapat kondisi ketika penerima pesan terenkripsi hanya diperbolehkan mengakses sebagian dari pesan terenkripsi. Kondisi ini disebut sebagai kondisi yang membutuhkan adanya pembatasan akses. Hal tersebut merupakan keterbatasan yang dimiliki oleh Public Key Encryption (PKE) konvensional…

Edition
--
ISBN/ISSN
--
Collation
xv, 82 hlm.
Series Title
-
Call Number
2022 ARN i
Availability2
Add to basket
MARC DownloadCite
cover
Implementing cryptography using python
Comment Share
Bray, Shannon W.

Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and sy…

Edition
-
ISBN/ISSN
9781119612209
Collation
xix, 304 hlm.; 24 cm
Series Title
-
Call Number
005.82 BRA i
Availability1
Add to basket
MARC DownloadCite
cover
Cryptology for engineers: an application-oriented mathematical introduction
Comment Share
Schmied, Robert

Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a s…

Edition
-
ISBN/ISSN
9789811208041
Collation
xx, 384 hlm; 23 cm
Series Title
-
Call Number
005.82 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
The digital big bang : the hard stuff, the soft stuff, and the future of cybe…
Comment Share
Quade, Phil

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?