Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 31 from your keywords: subject="Coding Theory"
First Page Previous 1 2 3 4 Next Last Page
cover
Introduction to cryptography with mathematical foundations and computer imple…
Comment Share
Rosen, Kenneth HStanoyevitch, Alexander

Content: An overview of the subject Divisibility and modular arithmetic The evolution of codemaking until the computer era Matrices and the Hill cryptosystem The evolution of codebreaking until the computer era Representation and arithmetic of integers in different bases Block cryptosystems and the data encryption standard (DES) Some number theory and algorithms Public key cry…

Edition
-
ISBN/ISSN
978-1439817636
Collation
xix, 649 hlm.; 26 cm.
Series Title
Discrete mathematics and its applications
Call Number
005.82 STA i
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Classical and contemporary cryptology
Comment Share
Spillman, Richard J.

Contents Chapter I. Introduction to cryptology Chapter II. Classical monoalphabetic ciphers Chapter III. Classical polyalphabetic ciphers Chapter IV. Classical polygraphic ciphers Chapter V. Classical transposition ciphers Chapter VI. Stream ciphers Chapter VII. Block ciphers Chapter VIII. Public key ciphers Chapter IX. Key management, digital signatures, hash functions, and certifica…

Edition
-
ISBN/ISSN
131828312
Collation
xiv, 285 hlm.; 24 cm.
Series Title
-
Call Number
652.8 SPI c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Turbo coding, turbo equalisation and space-time coding
Comment Share
Cole, MarionHanzo, L.Liew, T.H.Reay, DonaldYeap, B.L.

Tedapat bibliografi dan indeks. CONTENTS: About the Authors. Other Related Wiley

Edition
Second Edition
ISBN/ISSN
9780470972908
Collation
xviii, 654 lm.; ilus.; 25 cm.
Series Title
null
Call Number
621.382 HAN t
Availability1
Add to basket
MARC DownloadCite
cover
Fundamentals of engineering electromagnetics
Comment Share
Cheng, David K.Oppenheim, Alan V.Schafer, Ronald W.Syatiman

Terdapat bibliografi dan indeks. CONTENTS: 1. The Electromagnetic Model 1.1 Overview 1.2 The electromagnetic model 1.3 SI units and universal constants 2. Vector Analysis 2.1 Overview 2.2 Vector addition and subtraction 2.3 Vector multiplication 2.4 Orthogonal coordinate systems 2.5 Gradient of a scalar field 2.6 Divergence of a vector field 2.7 Divergence theorem 2.8 Curl of a vector field 2.…

Edition
International edition
ISBN/ISSN
9780201600711
Collation
xv, 488 hlm.; ilus.; 23 cm.
Series Title
Addison-Wesley Series in Electrical Engineering
Call Number
621.34 CHE f
Availability1
Add to basket
MARC DownloadCite
cover
Mathematics of publics key cryptography
Comment Share
Galbraith, Steven D.

1. Introduction Part I. Background: 2. Basic algorithmic number theory 3. Hash functions and MACs Part II. Algebraic Groups: 4. Preliminary remarks on algebraic groups 5. Varieties 6. Tori, LUC and XTR 7. Curves and divisor class groups 8. Rational maps on curves and divisors 9. Elliptic curves 10. Hyperelliptic curves Part III. Exponentiation, Factoring and Discrete Logarithms: 11. Basic al…

Edition
first
ISBN/ISSN
9781107013926
Collation
xiv, 615 hal.;ilus.;25cm
Series Title
null
Call Number
003.5 GAL m
Availability0
Add to basket
MARC DownloadCite
cover
Turbo coding, turbo equalisation and space-time coding
Comment Share
Hanzo, L.Liew, T.H.Yeap, B.L.

Tedapat bibliografi dan indeks. CONTENTS: About the Authors. Other Related Wiley

Edition
Second Edition
ISBN/ISSN
9780470972908
Collation
xviii, 654 lm.; ilus.; 25 cm.
Series Title
null
Call Number
621.382 HAN t
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability6
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?