Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 50 from your keywords: subject="CIA"
First Page Previous 1 2 3 4 5 Last Page
cover
Explainable artificial inteligence: menggunakan metode-metode berbasis neares…
Comment Share
SuyantoGia Septiana WulandariMuhammad FachrieEma RachmawatiMahmud Dwi Sulistiyo

Artificial Intelligence (AI), yang dapat diterjemahkan sebagai Kecerdasan Buatan atau Kecerdasan Artifisial, terus menjadi teknologi yang semakin disruptif pada bidang perbankan, keuangan, hiburan, bisnis digital, dan e commerce. Hanya sebagian kecil (atau hampir tidak ada) perusahaan yang mengaplikasikan Al dalam otomatisasi proses bisnisnya. Alasan utamanya adalah model-model (baik itu kla…

Edition
-
ISBN/ISSN
9786237131649
Collation
x, 222 hlm.; 24 cm
Series Title
-
Call Number
006.3 SUY e
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi teknik game-based learning berbasis Android guna meningkatkan se…
Comment Share
GirinotoNurul QomariasihRaden Budiarto HadiprakosoSalsa Alma'ariz

Rekapitulasi serangan siber yang diterbitkan oleh Pusat operasi keamanan siber nasional Badan Siber dan Sandi Negara menunjukkan serangan yang diterima pada tahun 2021 dilakukan dengan metode serangan social engineering. Dalam mencegah serangan social engineering tersebut, maka diperlukan cara untuk meningkatkan kesadaran kemanan terhadap social engineering itu sendiri salah satunya dengan Educ…

Edition
--
ISBN/ISSN
--
Collation
xiv, 35 hlm.
Series Title
-
Call Number
2022 SAL i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi sistem multi Intrusion Detection System (IDS) dan algoritma Supp…
Comment Share
AmiruddinRaden Budiarto HadiprakosoDimas Febriyan PriambodoAchmad Husein Noor Faizi

Meningkatnya kejahatan dan serangan siber menjadikan keamanan jaringan sebagai prasyarat dasar bagi organisasi, tetapi organisasi tidak bisa menjamin hal tersebut karena penggunaan Intrusion Detection System (IDS) pada suatu organisasi masih menggunakan IDS bersensor tunggal, baik hanya berupa Host-Based IDS (HIDS) maupun hanya berupa Network-Based IDS (NIDS). Batasan ruang lingkup deteksi kedu…

Edition
--
ISBN/ISSN
--
Collation
xiv, 59 hlm.
Series Title
-
Call Number
2022 ACH i
Availability2
Add to basket
MARC DownloadCite
cover
Applying data science: how to create value with artificial intelligence
Comment Share
Kordon, Arthur K.

This book offers practical guidelines on creating value from the application of data science based on selected artificial intelligence methods. Contents Part 1 Data Science Based on Artificial Intelligence Artificial Intelligence-Based Data Science Solutions Business Problems Dependent on Data Integrate and Conquer The Lost-in-Translation Trap Part 2 The AI-Based Data Science Workf…

Edition
-
ISBN/ISSN
9783030363741
Collation
xxxii, 494 hlm.; ilus.; 24 cm
Series Title
-
Call Number
006.3 KOR a
Availability1
Add to basket
MARC DownloadCite
cover
Cyber defence in the age of AI, smart societies and augmented humanity (Adva…
Comment Share
Jahankhani, HamidKendzierskyj, StefanChelvachandran, NishanIbarra, Jaime

This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies.…

Edition
-
ISBN/ISSN
9783030357450
Collation
viii, 450 hlm.; ilus.; 24 cm
Series Title
Advanced Sciences and Technologies for Security Applications
Call Number
005.8 JAH c
Availability1
Add to basket
MARC DownloadCite
cover
Post-quantum cryptography
Comment Share
Bernstein, Daniel J.Buchmann, JohannesDahmen, Erik

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …

Edition
-
ISBN/ISSN
9783540887010
Collation
viii, 245 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R005.82 BER p
Availability3
Add to basket
MARC DownloadCite
cover
Code and other laws of cyberspace
Comment Share
Lessig, Lawrence

Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…

Edition
First edition
ISBN/ISSN
0465039138
Collation
xii, 297 hal 25 cm
Series Title
--
Call Number
343 LES c
Availability1
Add to basket
MARC DownloadCite
cover
Mining the social web
Comment Share
Russell, Matthew A

Terdapat bibliografi dan indeks. Table of contents: 1. Introduction : hacking on Twitter data 2. Microformats : semantic markup and common sense collide 3. Mailboxes : oldies but goodies 4. Twitter : friends, followers, and setwise operations 5. Twitter : the tweet, the whole tweet, and nothing but the tweet 6. LinkedIn : clustering your professional network for fun (and profit?) 7. G…

Edition
First edition
ISBN/ISSN
9781449388348
Collation
xx, 332 hal.; ilus.; 24 cm
Series Title
--
Call Number
006.312 RUS m
Availability1
Add to basket
MARC DownloadCite
cover
Machine learning & computational intelligence
Comment Share
Widodo Budiharto

Daftar isi: 1. Pengantar machine learning 2. Klasifikasi dengan K-Nearest Neighbours 3. Support Vector Machine (SVM) 4. Pengenalan computational intelligence 5. Artificial Neural Network (ANN) 6. Supervised learning di neural network 7. Unsupervised learning di neural network 8. Fuzi logic 9. Genetic algorithm (GA) 10. Paricle swarm optimization 11. Natural dan artificial immune sys…

Edition
Ed. I
ISBN/ISSN
9789792958492
Collation
vi, 266 hal.; ilus.; 23 cm
Series Title
--
Call Number
006.3 WID m
Availability1
Add to basket
MARC DownloadCite
cover
CISA: certified information systems auditor study guide
Comment Share
Cannon, David LO'Hara, Brian T.Keele, Allen

Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …

Edition
Fourth edition
ISBN/ISSN
9781119056249
Collation
lxiv, 632 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.4038 CAN c
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?