Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4417 from your keywords: subject="Jamming-and-Replay"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Real world cryptography
Comment Share
Wong, David

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…

Edition
-
ISBN/ISSN
9781638350842
Collation
xxv, 370 hlm :23 cm
Series Title
--
Call Number
005.82 WON r
Availability2
Add to basket
MARC DownloadCite
cover
Advances and Applications in Computer Science, Electronics, and Industrial En…
Comment Share
Garcia, Marcelo V.Gordón-Gallegos, CarlosFernández-Peña, Félix

This book presents the proceedings of the 3rd Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2021), held in Ambato in October 2021, with participants from 10 countries and guest speakers from Chile, Colombia, Brasil, Spain, Portugal, and United States. Featuring 20 peer-reviewed papers, it discusses topics such as the use of metaheuristics for non-deterministic pr…

Edition
-
ISBN/ISSN
9783030977191
Collation
xii, 351 hal : 23cm
Series Title
-
Call Number
005,02 GAR a
Availability1
Add to basket
MARC DownloadCite
cover
Hardware security and trust: design and deployment of integrated circuits in …
Comment Share
Sklavos, NicolasRegazzoni, FrancescoChaves, RicardoDi Natale, Giorgio

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…

Edition
-
ISBN/ISSN
9783319443188
Collation
254 hlm
Series Title
--
Call Number
005.8 SKL h
Availability2
Add to basket
MARC DownloadCite
cover
Prosiding- constructive side-channel analysis and secure design: 13th interna…
Comment Share
O'flynn, ColinBalasch, Josep

his book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation …

Edition
-
ISBN/ISSN
9783030997663
Collation
279 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS BAL p
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Applied Incident Response
Comment Share
Anson, Steve

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starti…

Edition
-
ISBN/ISSN
9781119560289
Collation
446 hal
Series Title
-
Call Number
004.65 ANS a
Availability1
Add to basket
MARC DownloadCite
cover
Security Incidents and Response Against Cyber Attacks
Comment Share
Bhardwaj, AkashdeepSapra, Varun

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…

Edition
-
ISBN/ISSN
9783030691745
Collation
xiv, 246 hal : 23cm
Series Title
-
Call Number
005.8 BHA s
Availability1
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security and Intelligent Analytics
Comment Share
Verma, AbhishekVerma, Abhishek;Kumar, JitendraValentina EmiliaHari Mohan;Singh,

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a

Edition
-
ISBN/ISSN
9781000821451
Collation
viii, 291 hal : 23cm
Series Title
-
Call Number
005.8 VER a
Availability1
Add to basket
MARC DownloadCite
cover
Agile Security Operations : Engineering for Agility in Cyber Defense, Detecti…
Comment Share
Hettema, Hinne

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a

Edition
-
ISBN/ISSN
9781801812559
Collation
xvii, 234 : 23cm
Series Title
-
Call Number
005.8 HET a
Availability1
Add to basket
MARC DownloadCite
cover
Kamus Inggris Indonesia: an English-Indonesia dictionary
Comment Share
Echols, John M.Hassan Shadily

Daftar isi: Pendahuluan Susunan Bunyi bahasa indonesia Lambang yang digunakan Singkatan-singkatan Introduction Arrangement The sound of english Spelling Alphabet Symbols Kamus Inggris-Indonesia

Edition
Cetakan ketujuh
ISBN/ISSN
9786020305639
Collation
xxx, 824 hal.; ilus.; 23 cm
Series Title
--
Call Number
R423.1 ECH k
Availability8
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?