Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4417 from your keywords: subject="Jamming-and-Replay"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Pengembangan aplikasi yang aman = secure software development lifecycle
Comment Share
Hermawan SetiawanRaden Budiarto HadiprakosoYulandi

Sekarang ini pengembangan perangkat lunak tidak bisa lepas dari aspek keamanannya yang menjadi penekanan pada Secure Software Development Lifecycle (SSDLC). Karena ada ada beberapa penyebab misalnya : mengidentifikasi dan memperbaiki masalah keamanan setelah aplikasi dirilis biasanya lebih mahal dan memakan waktu dibandingkan menangani masalah tersebut selama pengembangan. Bahkan Pelanggaran …

Edition
-
ISBN/ISSN
9786231024800
Collation
iv, 98 hal : 25 cm
Series Title
-
Call Number
005.8 HER.p
Availability3
Add to basket
MARC DownloadCite
cover
Light on yoga
Comment Share
Iyengar, B.K.SLowenthal, Mark M.

Catatan: terdapat indeks.

Edition
null
ISBN/ISSN
4149035
Collation
543 hlm; ilus; 19 cm
Series Title
null
Call Number
181.45 IYE l
Availability0
Add to basket
MARC DownloadCite
cover
Square attack pada Midori64
Comment Share
Santi IndarjaniDwi Baskara Wardhana

Midori64 merupakan algoritme block cipher yang dipublikasikan oleh Banik et al (2015). Banik et al mengklaim bahwa Midori64 aman terhadap integral attack. Salah satu jenis integral attack adalah square attack. Berdasarkan hal tersebut maka dalam penelitian ini dilakukan square attack pada Midori64 dengan menggunakan semua kemungkinan jumlah dan posisi nibble aktif serta menganalisis ketahanan M…

Edition
null
ISBN/ISSN
null
Collation
ix, 66 hlm.
Series Title
null
Call Number
2018 DWI s
Availability2
Add to basket
MARC DownloadCite
cover
Possible minds : twenty-five ways of looking at AI
Comment Share
John Brockman

"Science world luminary John Brockman assembles twenty-five of the most important scientific minds, people who have been thinking about the field artificial intelligence for most of their careers, for an unparalleled round-table examination about mind, thinking, intelligence and what it means to be human"-- Provided by publisher.

Edition
-
ISBN/ISSN
9780525557999
Collation
xxvi, 293 pages ; 24 cm
Series Title
-
Call Number
006.3 BRO e
Availability0
Add to basket
MARC DownloadCite
cover
C: How to Program 6th Edition
Comment Share
Paul DeitelHarvey M. Deitel

C How to Program, 6e, is ideal for introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology. This text provides a valuable reference for programmers and anyone interested in learning the C programming language. The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object…

Edition
-
ISBN/ISSN
9780137059669
Collation
998 hal: ilus : 25 cm
Series Title
-
Call Number
005.262 DEI c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Cryptography and Machine Learning : Fourth International Sympo…
Comment Share
Dolev, ShlomiSachin;Weiss, GeraVladimir;Lodha,Shlomi;Kolesnikov

This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020. The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber secur…

Edition
-
ISBN/ISSN
9783030497859
Collation
xii, 253 hal : 23cm
Series Title
-
Call Number
005.8 DOL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
Embedded Systems Architecture : Explore Architectural Concepts, Pragmatic Des…
Comment Share
Lacamera, Daniele

Edition
-
ISBN/ISSN
9781788830287
Collation
vi, 305 hal : 23 cm
Series Title
-
Call Number
004.22 LAC e

Edition
-
ISBN/ISSN
9781788830287
Collation
vi, 305 hal : 23 cm
Series Title
-
Call Number
004.22 LAC e
Availability1
Add to basket
MARC DownloadCite
cover
Designing Embedded Hardware
Comment Share
Catsoulis, John

Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of …

Edition
-
ISBN/ISSN
9780596520939
Collation
xvi, 370 hal : 23cm
Series Title
-
Call Number
004.16 CAT d
Availability1
Add to basket
MARC DownloadCite
cover
Authentication and Access Control : Practical Cryptography Methods and Tools
Comment Share
Boonkrong, Sirapat

Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and access control are the first line of defense to help protect you from being attacked. This book begins with the theoretical background of cryptography and the foundations of authentication technologies and attack mechanisms. You will learn about the mechanisms that are available …

Edition
-
ISBN/ISSN
9781484265703
Collation
xvii, 230 hal :23cm
Series Title
-
Call Number
005.8 BOO a
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?