Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 275 from your keywords: subject="Computer security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Designing network security
Comment Share
Kaeo, Merike

Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …

Edition
--
ISBN/ISSN
1578700434
Collation
xv, 426 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAE d
Availability1
Add to basket
MARC DownloadCite
cover
Computational intelligence in information assurance and security
Comment Share
Nedjah, NadiaAbraham, AjithMourelle, Luiza de Macedo

Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…

Edition
--
ISBN/ISSN
9783540710776
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
Studies in computational intelligence
Call Number
005.8 NED c
Availability1
Add to basket
MARC DownloadCite
cover
Information security governace simplified: from the boardroom to the keyboard
Comment Share
Fitzgerald, Todd

Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…

Edition
--
ISBN/ISSN
9781439811634
Collation
xxviii, 383 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8068 FIT i
Availability2
Add to basket
MARC DownloadCite
cover
Information security policy development for compliance: ISO/IEC 27001, NIST S…
Comment Share
Williams, Barry L.

Contents: Introduction Entity-Level Policies and Procedures Access-Control Policies and Procedures Change Control and Change Management System Information Integrity and Monitoring System Services Acquisition and Protection Informational Asset Management Continuity of Operations Appendices: ISO / IEC 27001 (Annex A) Controls(c) ISO NIST S P 800-53 Controls HIPAA Security R…

Edition
--
ISBN/ISSN
9781466580589
Collation
x, 142 hal.; ilus.; 24cm
Series Title
--
Call Number
005.8068 WIL i
Availability3
Add to basket
MARC DownloadCite
cover
Recent advances in RSA cryptography
Comment Share
Katzenbeisser, Stefan

Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures

Edition
--
ISBN/ISSN
9781461355502
Collation
xiii, 139 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAT r
Availability1
Add to basket
MARC DownloadCite
cover
Differential cryptanalysis on hash functions: theory and practice (attack alg…
Comment Share
Tao, XieFanbao, Liu

Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research

Edition
--
ISBN/ISSN
9783659612008
Collation
xiv, 362 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 TAO d
Availability1
Add to basket
MARC DownloadCite
cover
Cryptanalysis of RSA and its variants
Comment Share
Hinek, M. Jason

Contents: I. Preliminaries 1. The RSA Cryptosystem 2. Some Notation, Mathematics and Techniques II. Cryptanalysis of RSA 3. Some Early Attacks 4. Small Public Exponent Attacks 5. Small Private Exponent Attacks 6. Partial Key Exposure Attacks 7. More Small Private Exponent Attacks III. Cryptanalysis of Variants of RSA 8. Crt-Rsa 9. Multi-Prime RSA 10. Multi-Power RSA 1…

Edition
--
ISBN/ISSN
9781420075182
Collation
xviii, 268 hlm.: 25 cm.
Series Title
--
Call Number
005.82 HIN c
Availability3
Add to basket
MARC DownloadCite
cover
Introduction to cryptography: principles and applications
Comment Share
Delfs, HansKnebl, HelmutMaurer, Ueli

Termasuk bibliografi dan indeks. Guide to elliptic curve cryptography / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes. Computer security. Public key cryptography. ContentsList of Algorithms List of Tables List of Figures Acronyms CONTENTS: 1. Introduction 1.1 Encryption and Secrecy 1.2 The Objectives of Cryptography 1.3 Attacks 1.4 Cryptographic Protocols 1.5 P…

Edition
Second Edition
ISBN/ISSN
9783540492436
Collation
xvi, 367 hlm.; ilus.; 24 cm.
Series Title
--
Call Number
005.82 DEL i
Availability3
Add to basket
MARC DownloadCite
cover
Pedoman praktis keamanan informasi untuk pengguna rumah & individu: 9 rekomen…
Comment Share
Juliati Junde

Daftar isi: Pendahuluan Sembilan hal penting untuk diketahui Langkah 1: Pasang dan gunakan program anti-virus Langkah 2: Lakukan patch pada sistem anda Langkah 3: Hati-hati dalam membaca email dengan attachment Langkah 4: Pasang dan gunakan program firewall Langkah 5: Lakukan backups untuk file dan folder penting Langkah 6: Gunakan password yang kuat Langkah 7: Hati-hati ketika downl…

Edition
Cetakan keempat
ISBN/ISSN
--
Collation
v, 42 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 JUL p
Availability1
Add to basket
MARC DownloadCite
cover
The basics of information security: understanding the fundamentals of infosec…
Comment Share
Andress, Jason

Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…

Edition
Second Edition
ISBN/ISSN
9780128007440
Collation
xxi, 217 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND b
Availability1
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?