Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 308 from your keywords: subject="Log"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Strategic management of technological innovation
Comment Share
Schiling, Melissa A.

Strategic Management of Technological Innovation, 3/e by Melissa Schilling is the first comprehensive and rigorous, yet accessible text for the Technology and Innovation Management course. Unlike other books, Schilling's approach synthesizes the major research in the field, providing students with the knowledge needed to enhance case discussion and analysis. The subject is approached as a strat…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780071289573
Collation
xvi, 318 hlm.: ilus.; 23 cm.
Series Title
-
Call Number
658.575 SCH s
Availability1
Add to basket
MARC DownloadCite
cover
Managing development and application of digital technologies: research insigh…
Comment Share
Brugge, BerndHegering, Heinz-GerdKern, Eva-Maria

Table of Contents: - Digital Technology and Management. - Digital Rights Management. - IT Service Management. - Future Communication Networks. - Mobile Services. - Location-based and Ubiquitous Services.

Edition
-
ISBN/ISSN
9783450341284
Collation
x, 341 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
004.11 KER m
Availability1
Add to basket
MARC DownloadCite
cover
Metodologi penelitian: kuantitatif, kualitatif, dan campuran untuk manajemen,…
Comment Share
Poppy YaniawatiRully Indrawan

DAFTAR ISI: 1. Filsafat Ilmu dan penelitian 1.1 Metode ilmiah 1.2 Teori, konsep, dan variable 1.3 Peneliatian 1.4 Proses penelitian 2. Perencanaan penelitian 2.1 Masalah 2.2 Ide masalah 2.3 Pengkajian dan pengembangan masalah 2.4 Pendekatan penelitian 2.5 Ruang lingkup 2.6 Propsal penelitian 3. Metode penelitian 3.1 Pendekatan kuantitatif dan kualitatif 3.2 Pendekatan kuantitatif…

Edition
Edisi Revisi Cetakan Kedua
ISBN/ISSN
9786027948884
Collation
viii, 274 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
001.42 RUL m
Availability1
Add to basket
MARC DownloadCite
cover
Metodologi penelitian: kuantitatif, kualitatif, dan campuran untuk manajemen,…
Comment Share
Poppy YaniawatiRully Indrawan

DAFTAR ISI: 1. Filsafat Ilmu dan penelitian 1.1 Metode ilmiah 1.2 Teori, konsep, dan variable 1.3 Peneliatian 1.4 Proses penelitian 2. Perencanaan penelitian 2.1 Masalah 2.2 Ide masalah 2.3 Pengkajian dan pengembangan masalah 2.4 Pendekatan penelitian 2.5 Ruang lingkup 2.6 Propsal penelitian 3. Metode penelitian 3.1 Pendekatan kuantitatif dan kualitatif 3.2 Pendekatan kuantitatif…

Edition
Edisi Revisi Cetakan Kedua
ISBN/ISSN
9786027948884
Collation
viii, 274 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
001.42 RUL m
Availability1
Add to basket
MARC DownloadCite
cover
The Handbook of information and computer ethics
Comment Share
Himma, Kenneth EinarTavani, Herman T

Contents: 1. Foreword / Deborah G. Johnson 2. Introduction / Kenneth Einar Himma and Herman T. Tavani 3. Foundations of information ethics / Luciano Floridi 4. Milestones in the history of information and computer ethics / Terrell Ward Bynum 5. Moral methodology and information technology / Jeroen van den Hoven 6. Value sensitive design and information systems / Batya Friedman, Peter…

Edition
-
ISBN/ISSN
9780471799597
Collation
xxxi, 671 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R004.01 HIM h
Availability1
Add to basket
MARC DownloadCite
cover
The Hash function BLAKE
Comment Share
Aumasson, Jean-PhilippeHenzen, LucaMeier, WiliPhan, Raphael C.-W.

CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…

Edition
-
ISBN/ISSN
9783662447567
Collation
Berlin
Series Title
Information Security and Crypography
Call Number
005.8 AUM h
Availability1
Add to basket
MARC DownloadCite
cover
Strategi Pemulihan Sistem Pemberitaan Rahasia di Pusat Komunikasi Departemen …
Comment Share
Tetra Widianto

Dalam perspektif teknologi informasi (TI), strategi pemulihan merupakan cara mengembalikan operasi TI setelah terjadinya gangguan pada layanan TI tersebut. Berdasarkan pedoman NIST SP 800-34, strategi pemulihan dianalisis menggunakan metode Business Impact Analysis (BIA) dimana tahapan yang dilakukan antara lain: mengidentifikasi proses bisnis yang kritis, mengidentifikasi dampak kerusakan da…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2008 TET s
Availability0
Add to basket
MARC DownloadCite
cover
PENERAPAN IDENTITY BASED FUNGSI ENCRYPTION DENGAN FUNGSI TATE PAIRING PADA LO…
Comment Share
RIKSON GULTOM

Aplikasi di internet dapat digunakan oleh siapa saja yang tersambung ke jaringan tersebut. User dapat menggunakan aplikasi internet, bila yang bersangkutan memiliki hak akses. Salah satu perlindungan keamanan akses penggunaan aplikasi adalah dengan menggunakan login. Tetapi, teknik login biasa memiliki beberapa kelemahan, antara lain rentan terhadap pencurian password dengan menggunakan teknik…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 RIK p
Availability0
Add to basket
MARC DownloadCite
cover
Psikologi komunikasi
Comment Share
Jalaluddin Rakhmat

Edition
Cet. 29
ISBN/ISSN
9795141457
Collation
xiii, 318 hlm.; ilus.; 22 cm
Series Title
-
Call Number
153.6 JAL p

Edition
Cet. 29
ISBN/ISSN
9795141457
Collation
xiii, 318 hlm.; ilus.; 22 cm
Series Title
-
Call Number
153.6 JAL p
Availability0
Add to basket
MARC DownloadCite
cover
Signals, systems, and transforms
Comment Share
Beasley, Jeffrey SParr, John MPhillips, Charles LRiskin, Ave A

CONTENTS 1 INTRODUCTION 1.1 Modeling 1.2 Continuous-Time Physical Systems 1.3 Samplers and Discrete-Time Physical Systems 1.4 MATLAB and SIMULINK 1.5 Signals and Systems References 2 CONTINUOUS-TIME SIGNALS AND SYSTEMS 2.1 Transformations of Continuous-Time Signals 2.2 Signal Characteristics 2.3 Common Signals in Engineering 2.4 Singularity Functions 2.5 Mathematical Functions for Signals 2.6 …

Edition
fourth edition
ISBN/ISSN
9780132067423
Collation
xx, 774 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
621.382 PHI s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?