Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 29 from your keywords: subject="Wireless"
First Page Previous 1 2 3 Next Last Page
cover
Implementasi skema key establishment pada wireless sensor network menggunakan…
Comment Share
Annisa Dini HandayaniYeni FaridaNia YuliantiAji Agung Sedayu

Kriptografi merupakan teknik untuk menyembunyikan pesan agar tidak diketahui oleh pihak yang tidak berhak. Dalam penerapannya kriptografi memerlukan kunci rahasia. Kunci didapatkan dari proses pembentukan kunci yang disebut key establishment. Tujuan dari key establishment adalah untuk menetapkan kunci yang digunakan untuk melakukan komunikasi yang aman. Salah satu penerapan key establishment a…

Edition
--
ISBN/ISSN
--
Collation
xv, 31 hlm.
Series Title
-
Call Number
2022 AJI i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi dan analisis KARMA Attack pada WPA3
Comment Share
Muhammad Yusuf Bambang SetiadjiObrina Candra BriliyantIra Rosianal HikmahAhmad Alinnoor Ulinuha Alby Alwitri

WPA3 merupakan protokol keamanan terbaru dari WiFi yang diperkenalkan pada tahun 2018 oleh WiFi Alliance. WPA3 menerapkan protokol Simultaneous Authentication of Equals (SAE) handshake. Protokol ini diproyeksikan akan menggantikan WPA2 yang sudah rentan terhadap berbagai serangan. Dalam dunia keamanan siber, tidak ada sistem yang 100% aman. Begitupula sistem keamanaan yang terdapat pada WPA3. K…

Edition
--
ISBN/ISSN
--
Collation
xv, 65 hlm
Series Title
-
Call Number
2021 AHM i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi skema Secure Key Issuing dan skema pembagian kunci sebagai alter…
Comment Share
Annisa Dini HandayaniYeni FaridaAgung PratigunaNia Yulianti

Penerapan Identity-Based Cryptography (IBC) pada Wireless Sensor Network (WSN) dianggap sesuai karena pada IBC tidak terdapat proses sertifikasi kunci publik seperti yang ada pada Public Key Infrastructure (PKI). Meskipun demikian, terdapat kekurangan dari penerapan IBC pada WSN yaitu permasalahan key escrow. Pada penelitian ini dilakukan implementasi skema secure key issuing milik Lee dkk. dan…

Edition
--
ISBN/ISSN
--
Collation
xvi, 25??????
Series Title
-
Call Number
2021 AGU i
Availability2
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
cover
Router mikroTik: implementasi wireless LAN indoor
Comment Share
Rendra TowidjojoMohammad Eno Farhan

Daftar isi: BAB 1 Introduction to wireless local area network (WLAN) BAB 2 Mikrotik wireless BAB 3 Basic service set BAB 4 Extended service set (ESS) BAB 5 Wireless distribution system (WDS) BAB 6 WDS mesh BAB 7 Controller access point system manager (CAPsMAN) BAB 8 User manager BAB 9 Best practice

Edition
--
ISBN/ISSN
9786020823058
Collation
xiv, 282 hal.; ilus.; 21 cm
Series Title
--
Call Number
004.68 REN r
Availability1
Add to basket
MARC DownloadCite
cover
802.11 wireless networks: security and analysis
Comment Share
Holt, AlanChi-Yu, Huang

Contents: 1. Introduction 2. Radio Frequencies 3. Medium Access Control 4. Physical Layer 5. Cryptography 6. Wireless Security 7. Configuring Wireless Networks 8. Robust Security Network 9. MAC Layer Performance Analysis 10. Link Rate Adaptation 11. Build a Xen Server 12. Initial Configuration of Access-point Controllers

Edition
--
ISBN/ISSN
9781849962742
Collation
212 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.66 HOL e
Availability2
Add to basket
MARC DownloadCite
cover
Cyber-physical system design with sensor networking technologies
Comment Share
Zeadally, SheraliJabeur, Nafaa

Contents: 1 Wireless sensor networks: basics and fundamentals 2 Cyber-physical systems: basics and fundamentals 3 Integrating wireless sensor networks and cyber-physical systems: challenges and opportunities 4 Enabling cyber-physical systems architectural design with wireless sensor network technologies 5 Cyber security in cyber-physical systems: on false data injection attacks in t…

Edition
--
ISBN/ISSN
9781849198240
Collation
xxii, 340 hal.; ilus.; 24 cm
Series Title
IET control engineering series 96
Call Number
R004.6 ZEA c
Availability1
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?