Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4417 from your keywords: subject="Jamming-and-Replay"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Security, Privacy, and Applied Cryptography Engineering : 12th International …
Comment Share
Batina, LejlaMondal, MainackPicek, Stjepan

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key crypt…

Edition
-
ISBN/ISSN
9783031228292
Collation
340 hal ; 23cm
Series Title
-
Call Number
005.8 BAT s
Availability1
Add to basket
MARC DownloadCite
cover
Secure Data Science : Integrating Cyber Security and Data Science
Comment Share
Thuraisingham, Bhavani MKantarcioglu, Murat;Khan, LatifurKantarcioglu, Murat

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied …

Edition
-
ISBN/ISSN
9781000557510
Collation
xix, 435 hal :23 cm
Series Title
-
Call Number
005.8 THU s
Availability1
Add to basket
MARC DownloadCite
cover
Slow living hidup bukanlah pelarian tapi perjalanan: berlatihlah menginjak re…
Comment Share
Sabrina Ara

Penjelasan buku “slow living” menawarkan wawasan tentang gaya hidup yang melambat namun tetap produktif. Ini mengajarkan kita untuk menikmati setiap momen tanpa terlalu sibuk berlari menuju tujuan akhir. Dalam melambat, kita bisa lebih memperhatikan kesehatan mental dan fisik kita, menjaga keseimbangan antara pekerjaan dan kehidupan pribadi. Daftar isi: BAB 1 Zaman yang terobsesi pada …

Edition
Cet. 1
ISBN/ISSN
9786235269283
Collation
viii, 115 hlm.; 20 cm
Series Title
--
Call Number
153.8 SAB s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Threat Intelligence : The No-Nonsense Guide for CISOs and Security Mana…
Comment Share
Aaron Robert

Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develo…

Edition
-
ISBN/ISSN
9781484272206
Collation
xxii, 205 hal : 23cm
Series Title
-
Call Number
005.8 ROB c
Availability1
Add to basket
MARC DownloadCite
cover
Embedded Systems Design : An Introduction to Processes, Tools, and Techniques
Comment Share
Arnold Berger

* Hardware/Software Partitioning * Cross-Platform Development * Firmware Debugging * Performance Analysis * Testing & Integration Get into embedded systems programming with a clear understanding of the development cycle and the specialized aspects of

Edition
-
ISBN/ISSN
9781482280715
Collation
xxviii, 237 hal:23cm
Series Title
-
Call Number
006.22 BER c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security: Issues and Current Trends
Comment Share
Dutta, NitulSudeep;Sarma,Hiren Kumar Deva;Pricop,Emil

This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introdu…

Edition
-
ISBN/ISSN
9789811665974
Collation
xii, 174 hal : 23 cm
Series Title
-
Call Number
005.82 DUT c
Availability1
Add to basket
MARC DownloadCite
cover
Demystifying Cryptography with OpenSSL 3. 0 : Discover the Best Techniques to…
Comment Share
Khlebnikov, AlexeiAdolfsen, Jarle

Key Features Secure your applications against common network security threats using OpenSSLGet to grips with the latest version of OpenSSL, its new features, and advantagesLearn about PKI, cryptography, certificate authorities, and more using real-world examples Book Description Security and networking are essential features of software today. The modern internet is full of worms, Tr…

Edition
-
ISBN/ISSN
9781800562226
Collation
xx, 320 hal : 23cm
Series Title
-
Call Number
005.824 KHL d
Availability0
Add to basket
MARC DownloadCite
cover
Advances in Applications of Computational Intelligence and the Internet of Th…
Comment Share
Chowdhury, Rajdeep,Niranjan,

This new volume illustrates the diversified applications of IoT. The volume addresses the issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. Advances in Applications of Computational Intelligence and the Internet of Things (IoT) looks at the application of IoT in medical technology and healthcare, incl…

Edition
-
ISBN/ISSN
9781000286663
Collation
xiii, 162 hal : 23cm
Series Title
--
Call Number
006.3 CHO a
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Education : Principles and Policies
Comment Share
Austin, Greg

"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of …

Edition
-
ISBN/ISSN
9780367822576
Collation
xx, 225 hal : 23cm
Series Title
-
Call Number
005.8071
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?