Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Comment Share
Haataja, KeijoHypponen, KonstantinPasanen, SannaToivanen, Pekka

Table of contents: 1.Introduction 2.Overview of Bluetooth Security 3.Reasons for Bluetooth Network Vulnerabilities 3.1.Vulnerability to Eavesdropping 3.2.Weaknesses in Encryption Mechanisms 3.3.Weaknesses in PIN Code Selection 3.4.Weaknesses in Association Models of SSP 3.5.Weaknesses in Device Configuration 4.Comparative Analysis of Bluetooth Security Attacks 4.1.Disclosure Threats …

Edition
--
ISBN/ISSN
9783642406454
Collation
93 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 HAA b
Availability1
Add to basket
MARC DownloadCite
cover
New stream cipher designs: the eSTREAM finalists
Comment Share
Robshaw, MatthewBillet, Olivier

Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…

Edition
--
ISBN/ISSN
9783540683506
Collation
viii, 293 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 ROB n
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Security operations center: building, operating, and maintaining your SOC
Comment Share
Muniz, JosephMclntyre, GaryAlfardan, Nadhem

Table of contents: 1. Introduction to security operations and the SOC 2. Overview of SOC technologies 3. Assessing security operations capabilities 4. SOC strategy 5. The SOC infrastructure 6. Security event generation and collection 7. Vulnerability management 8. People and processes 9. The technology 10. Preparing to operate 11. Reacting to events and incidents 12. Maintain, revie…

Edition
--
ISBN/ISSN
9780134052014
Collation
xxi, 424 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MUN s
Availability1
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkMcDonald, JohnSchuh, Justin

Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459

Edition
--
ISBN/ISSN
9780321444424
Collation
xxi, 557 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOW a1
Availability1
Add to basket
MARC DownloadCite
cover
The art of software security assessment: identifying and preventing software …
Comment Share
Dowd, MarkSchuh, JustinMcDonald, Jhon

10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

Edition
--
ISBN/ISSN
9780321444424
Collation
569 hal.; ilus.; 23cm
Series Title
--
Call Number
005.8 DOW a2
Availability1
Add to basket
MARC DownloadCite
cover
Cyberwar: law and ethics for virtual conflicts
Comment Share
Ohlin, Jeens DavidGovern, KevinFinkelstein, Claire

Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" /​ Larry May 2.Is There Anything Morally Special about Cyberwar? /​ James L Cook 3.Cyber Causation /​ Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law /​ Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…

Edition
--
ISBN/ISSN
9780198717508
Collation
xxxii, 274 hal.; 25 cm.
Series Title
--
Call Number
341.6 OHL c
Availability1
Add to basket
MARC DownloadCite
cover
Network performance and security: testing and analyzing using open source and…
Comment Share
Chapman, Chris

Contents: 1. Introduction to practical security and performance testing 2. Getting organized with initial audit of tnetworkwrk 3. Locking down the infrastructure: internet, wi-fi, wired, VPN, WAN, and the core 4. Locking down and optimizing the Windows client 5. Server patterns 6. Testing for security flaws using penetration testing 7. Using Wireshark and TCP Dump to visualize traffic 8…

Edition
--
ISBN/ISSN
9780128035849
Collation
xiv, 366 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.82 CHA n
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?