Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Wireless Security : Models, Threats, and Solutions
Comment Share
Panos C. LekkasRandal K. Nichols

Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 NIC w
Availability0
Add to basket
MARC DownloadCite
cover
CLOUD SECURITY: A Comprehensive Guide to Secure Cloud Computing
Comment Share
Ronald L. KrutzRussel Dean Vines

Table of Contents Foreword xxi Introduction xxiii Chapter 1 Cloud Computing Fundamentals 1 What Cloud Computing Isn’t 7 Alternative Views 8 Essential Characteristics 9 On-Demand Self-Service 9 Broad Network Access 10 Location-Independent Resource Pooling 10 Rapid Elasticity 10 Measured Service 11 Architectural Influences 11 High-Performance Computing 11 Utility and Enterprise Gr…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
005.8 KRU c
Availability0
Add to basket
MARC DownloadCite
cover
Computer security handbook
Comment Share
Bosworth, SeymourHoyt, Douglas B.Hutt, Arthur E.

Contents List of Contributors xii Preface xxi Introduction xxiii Part I Management Responsibility 1 1. Chapter 1: Management’s Role in Computer Security 3 2. Chapter 2: Information Security Risk Management 22 3. Chapter 3: Employees 33 4. Chapter 4: Legal Issues in Computer Security 46 5. Chapter 5: Computer Crime and Computer Criminals 58 Part II Basic Safeguards 81 6. Chapter 6: …

Edition
Second Edition
ISBN/ISSN
002915300X
Collation
xxiii, 399 hlm.; ilus.; 29 cm.
Series Title
-
Call Number
R 005.8 HUT C
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security:principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Third Edition (International Edition)
ISBN/ISSN
9780131115026
Collation
xiv, 681 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography of number theoretic ciphers
Comment Share
Atallah, Mike J.Fannin, D. R.Wagstaff, Samuel S.

Termasuk bibliografi dan indeks. CONTENTS:
Terminology of Cryptography
Notation
Types of Attacks
Public Key Ciphers
Block and Stream Ciphers
Protocols

Probability Theory
Definitions
The Birthday Problem
Random Variables

Divisibility and Arithmetic
Divisibility
Arithmetic with Large Integers
Grea…

Edition
null
ISBN/ISSN
1584881534
Collation
xv, 318 hlm.; ilus.; 24 cm.
Series Title
Computational mathematics series
Call Number
005.8 WAG c
Availability1
Add to basket
MARC DownloadCite
cover
Quantum attacks on public-key cryptosystems
Comment Share
Song Y. Yan

CONTENTS: 1.Classic and Quantum Computation 1.1.Classical Computability Theory 1.2.Classical Complexity Theory 1.3.Quantum Information and Computation 1.4.Quantum Computability and Complexity 1.5.Conclusions, Notes, and Further Reading References 2.Quantum Attacks on IFP-Based Cryptosystems 2.1.IFP and Classical Solutions to IFP 2.2.IFP-Based Cryptography 2.3.Quantum Attack…

Edition
-
ISBN/ISSN
9781441977212
Collation
viii, 207 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
005.8 SON q
Availability3
Add to basket
MARC DownloadCite
cover
Primality testing and integer factorization in public-key cryptography
Comment Share
Song Y. Yan

Table of Contents: 1.Number-Theoretic Preliminaries.- Problems in Number Theory. Divisibility Properties. Euclid's Algorithm and Continued Fractions. Arithmetic Functions. Linear Congruences. Quadratic Congruences. Primitive Roots and Power Residues. Arithmetic of Elliptic Curves. Chapter Notes and Further Reading.- 2.Primality Testing and Prime Generation.- Computin…

Edition
Second Edition
ISBN/ISSN
9780387772677
Collation
xviii, 371 hlm.; ilus.: 27 cm.
Series Title
Advances in information security ; 11
Call Number
005.8 SON p
Availability0
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Jajodia, SushilTilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9781441959058
Collation
xl, 1416 hlm.; 26 cm
Series Title
-
Call Number
R005.803 TIL e
Availability2
Add to basket
MARC DownloadCite
cover
Digital watermarking
Comment Share
Bloom, Jeffrey A.Cox, Ingemar J.Miller, Matthew L.

Example Watermarking Systems 1 Introduction 2 Applications and Properties 3 Models of Watermarking 4 Basic Message Coding 5 Watermarking with Side Information 6 Analyzing Errors 7 Using Perceptual Models 8 Robust Watermarking 9 Watermark Security 10 Content Authentication Appendix A: Background Concepts Appendix B: Selected Theoretical Results Appendix C: Source Code Appendix D: N…

Edition
-
ISBN/ISSN
1558607145
Collation
xxv, 539 hlm.; 26 cm.
Series Title
-
Call Number
005.8 COX d
Availability0
Add to basket
MARC DownloadCite
cover
Advances in elliptic curve cryptography
Comment Share
Blake, Ian F.Seroussi, GadielSmart, Nigel P.

Edition
-
ISBN/ISSN
9780521604154
Collation
xvi, 281 hlm.; 23 cm.
Series Title
Lecture note series
Call Number
516.3 BLA a

Edition
-
ISBN/ISSN
9780521604154
Collation
xvi, 281 hlm.; 23 cm.
Series Title
Lecture note series
Call Number
516.3 BLA a
Availability1
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?