Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 154 from your keywords: subject="Science"
First Page Previous 1 2 3 4 5 Next Last Page
cover
A Guide to Data Compression Methods
Comment Share
David Salomon

In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him. Braille himself modified his code in 1834, and there have been several modifications since. However, the basic design of this code, where each character is represented by a group of 3 x 2 dots, has remained i…

Edition
cet 1
ISBN/ISSN
9780387952604
Collation
xii, 295 hal : ill. ; 24 cm.
Series Title
-
Call Number
005.74 SAL a
Availability1
Add to basket
MARC DownloadCite
cover
AI and Data Science: Technology, Innovation & Use Cases In Indonesia
Comment Share
Rudi RusdiahHammam Riza, dkk

Indonesia saat ini dihadapkan oleh berbagai potensi dan tantangan di masa depan seperti bonus demografi, Revolusi Industri 4.0 dengan teknologi Big Data. Al. Clouds dan Cyber, serta pandemi COVID-19. Disrupsi teknologi selalu dikaitkan dengan negative sums game. artinya mesin dan automation menyebabkan hilangnya 23 juta lowongan kerja pada 2030. Namun studi dari McKinsey: September 2019 menyebu…

Edition
-
ISBN/ISSN
9786239267223
Collation
xxii, 264 hal : 25 cm
Series Title
-
Call Number
006.3 HAM a
Availability1
Add to basket
MARC DownloadCite
cover
Data structures and algorithms : with object-oriented design patterns in C++
Comment Share
Bruno R. Preiss

About The Book: Bruno Preiss presents readers with a modern, object-oriented perspective for looking at data structures and algorithms, clearly showing how to use polymorphism and inheritance, and including fragments from working and tested programs. The book uses a single class hierarchy as a framework to present all of the data structures. This framework clearly shows the relationships betwee…

Edition
-
ISBN/ISSN
0471241342
Collation
xvii, 660 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.1 PRE d
Availability1
Add to basket
MARC DownloadCite
cover
Algebraic cryptanalysis
Comment Share
Bard, Gregory V.

Contents 1 Introduction: how to use this book Part I Cryptanalysis 2 The block cipher keeloq and algebraic attacks 3 The fixed-point attack 4 Iteratrd permutations 5 Stream ciphers Part II Linear systems mod 2 6 Some basic facts about linear algebra over GF (2) 7 The complexity of GF (2)-matrix operations 8 On the exponent of certain matrix operations 9 The method of fou…

Edition
--
ISBN/ISSN
9780387887562
Collation
xxxiii, 356 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BRA a
Availability1
Add to basket
MARC DownloadCite
cover
Black holes and baby universes: lubang hitam dan jagat bayi serta esai-esai l…
Comment Share
Hawking, Stephen

Dalam bukunya yang fenomenal, A Brief History of Time, Stephen Hawking dengan tegas mengubah cara berpikir kita tentang fisika, jagat raya, dan realitas. Melalui buku tersebut, Stephen Hawking, sebagai fisikawan teoretis paling cemerlang sejak Einstein, telah membuka pikiran kita untuk menerima gagasan-gagasan ilmiah paling penting dewasa ini tentang kosmos. Sekarang, Stephen Hawking datang …

Edition
Cet. 2
ISBN/ISSN
9786020631820
Collation
ix, 203 hlm.; 20 cm
Series Title
--
Call Number
523.112 HAW b
Availability1
Add to basket
MARC DownloadCite
cover
Cybercryptography: applicable cryptography for cyberspace security
Comment Share
Yan, Song Y.

Table of contents 1. Cyberspace Security and Cryptography 2. Mathematical Preliminaries 3. Computational Preliminaries 4. Secret-Key Cryptography 5. Factoring Based Cryptography 6. Logarithm Based Cryptography 7. Elliptic Curve Cryptography 8. Quantum Safe Cryptography 9. Offensive Cryptography 10. Back Matter

Edition
--
ISBN/ISSN
9783319725345
Collation
xi, 436 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 YAN c
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability0
Add to basket
MARC DownloadCite
cover
Prosiding- machine learning for cyber security: third international conferenc…
Comment Share
Chen, XiaofengYan, HongyangZhang, XiangliangYan, Qiben

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, …

Edition
-
ISBN/ISSN
9783030622237
Collation
674 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS CHE p
Availability1
Add to basket
MARC DownloadCite
cover
Mengembalikan data yang hilang
Comment Share
Dedik KurniawanJava Creativity

Buku ini tidak hanya membahas cara mengembalikan data yang hilang pada PC dan laptop, tetapi juga mencakup cara mengembalikan foto, video, mp3, kontak, sms, dan pesan Whatsapp yang pernah terhapus pada ponsel android. Sebagai tambahan, diajarkan pula cara membobol dan mengubah password Administrator pada Windows 7, 8, dan 10 yang kadang-kadang harus dilakukan ketika ingin menyelamatkan data dar…

Edition
-
ISBN/ISSN
9786230025006
Collation
xii, 239 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.86 DED m
Availability2
Add to basket
MARC DownloadCite
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?