Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 467 from your keywords: subject="Security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cyber Security Cryptography and Machine Learning : Fourth International Sympo…
Comment Share
Dolev, ShlomiSachin;Weiss, GeraVladimir;Lodha,Shlomi;Kolesnikov

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber secur…

Edition
-
ISBN/ISSN
9783030497859
Collation
xii, 253 hal : 23cm
Series Title
-
Call Number
005.8 DOL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
Authentication and Access Control : Practical Cryptography Methods and Tools
Comment Share
Boonkrong, Sirapat

Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available …

Edition
-
ISBN/ISSN
9781484265703
Collation
xvii, 230 hal :23cm
Series Title
-
Call Number
005.8 BOO a
Availability1
Add to basket
MARC DownloadCite
cover
Real world cryptography
Comment Share
Wong, David

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…

Edition
-
ISBN/ISSN
9781638350842
Collation
xxv, 370 hlm :23 cm
Series Title
--
Call Number
005.82 WON r
Availability2
Add to basket
MARC DownloadCite
cover
Hardware security and trust: design and deployment of integrated circuits in …
Comment Share
Sklavos, NicolasRegazzoni, FrancescoChaves, RicardoDi Natale, Giorgio

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…

Edition
-
ISBN/ISSN
9783319443188
Collation
254 hlm
Series Title
--
Call Number
005.8 SKL h
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Applied Incident Response
Comment Share
Anson, Steve

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…

Edition
-
ISBN/ISSN
9781119560289
Collation
446 hal
Series Title
-
Call Number
004.65 ANS a
Availability1
Add to basket
MARC DownloadCite
cover
Security Incidents and Response Against Cyber Attacks
Comment Share
Bhardwaj, AkashdeepSapra, Varun

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…

Edition
-
ISBN/ISSN
9783030691745
Collation
xiv, 246 hal : 23cm
Series Title
-
Call Number
005.8 BHA s
Availability1
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security and Intelligent Analytics
Comment Share
Verma, AbhishekVerma, Abhishek;Kumar, JitendraValentina EmiliaHari Mohan;Singh,

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a
Availability1
Add to basket
MARC DownloadCite
cover
Agile Security Operations : Engineering for Agility in Cyber Defense, Detecti…
Comment Share
Hettema, Hinne

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?