Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 13 from your keywords: subject="access control"
First Page Previous 1 2
cover
Penetration tester's open source toolkit
Comment Share
Faircloth, Jeremy

Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…

Edition
Third Edition
ISBN/ISSN
9781597496278
Collation
xxi, 441 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.84 FAI p
Availability1
Add to basket
MARC DownloadCite
cover
Access control, authentication, and public key infrastructure
Comment Share
Chapple, MikeBallad, BillBallad, TriciaBanks, Erin K.

Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…

Edition
Second Edition
ISBN/ISSN
9781284031591
Collation
xvii, 391 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CHA a
Availability1
Add to basket
MARC DownloadCite
cover
Fundamentals of cryptology: a professional reference and interactive tutorial
Comment Share
Tilborg, Henk C.A. van

Preface. 1. Introduction. 2. Classical Cryptosystems. 3. Shift Register Sequences. 4. Block Ciphers. 5. Shannon Theory. 6. Data Compression Techniques. 7. Public-Key Cryptography. 8. Discrete Logarithm Based Systems. 9. RSA Based Systems. 10. Elliptic Curves Based Systems. 11. Coding Theory Based Systems. 12. Knapsack Based Systems. 13. Hash Codes & Authentication Tech…

Edition
--
ISBN/ISSN
792386752
Collation
xiv, 491 hlm.; 25 cm.
Series Title
--
Call Number
005.82 TIL f
Availability3
Add to basket
MARC DownloadCite
First Page Previous 1 2
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?