Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 118 from your keywords: subject="Computer Science"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Analisis perancangan sistem berorientasi objek dengan UML
Comment Share
Munawar

Buku ini merupakan panduan untuk memahami bagaimana melakukan analisis dan perancangan software yang berorientasi obyek. Bahasan Buku : Pengembangan Software: Pengalaman Praktis Analisis Kebutuhan Perancangan Sistem Implementasi Sistem Dan Software Procesc Unified Modeling Language Bekerja Dengan Class Sekenario Sistem Logical View Process View Development View Physical View Stud…

Edition
Edisi 2
ISBN/ISSN
9786237131533
Collation
xii, 268 hal.; 23 cm
Series Title
-
Call Number
005.11 MUN a
Availability2
Add to basket
MARC DownloadCite
cover
Bug bounty bootcamp: the guide to finding and reporting web vulnerabilities
Comment Share
Li, Vickie

A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …

Edition
-
ISBN/ISSN
9781718501546
Collation
440 hlm.; 25 cm
Series Title
-
Call Number
005.8 LI b
Availability1
Add to basket
MARC DownloadCite
cover
Discrete mathematics and graph theory: a concise study companion and guide (u…
Comment Share
Erciyes, K.

This textbook can serve as a comprehensive manual of discrete mathematics and graph theory for non-Computer Science majors; as a reference and study aid for professionals and researchers who have not taken any discrete math course before. It can also be used as a reference book for a course on Discrete Mathematics in Computer Science or Mathematics curricula. Table of Contents Part I Fund…

Edition
-
ISBN/ISSN
9783030611149
Collation
xvi, 336 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
004.0151 ERC d
Availability1
Add to basket
MARC DownloadCite
cover
Hackathons: from idea to successful implementation
Comment Share
Kohne, AndreasWehmeier, Volker

This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. Table of conten…

Edition
-
ISBN/ISSN
9783030588380
Collation
xi, 106 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005 KOH h
Availability1
Add to basket
MARC DownloadCite
cover
Implementing cryptography using python
Comment Share
Bray, Shannon W.

Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and sy…

Edition
-
ISBN/ISSN
9781119612209
Collation
xix, 304 hlm.; 24 cm
Series Title
-
Call Number
005.82 BRA i
Availability1
Add to basket
MARC DownloadCite
cover
Cryptology for engineers: an application-oriented mathematical introduction
Comment Share
Schmied, Robert

Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a s…

Edition
-
ISBN/ISSN
9789811208041
Collation
xx, 384 hlm; 23 cm
Series Title
-
Call Number
005.82 SCH c
Availability1
Add to basket
MARC DownloadCite
cover
C: how to program
Comment Share
Deitel, HarveyDeitel, Paul J.

Edition
6th Ed. (International Version)
ISBN/ISSN
9780137059669
Collation
998 hlm.; ill.: 24 cm
Series Title
-
Call Number
005.262 DEI c

Edition
6th Ed. (International Version)
ISBN/ISSN
9780137059669
Collation
998 hlm.; ill.: 24 cm
Series Title
-
Call Number
005.262 DEI c
Availability1
Add to basket
MARC DownloadCite
cover
The digital big bang : the hard stuff, the soft stuff, and the future of cybe…
Comment Share
Quade, Phil

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t

Edition
-
ISBN/ISSN
9781119617365
Collation
xxviii, 306 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.8 QUA t
Availability1
Add to basket
MARC DownloadCite
cover
Feistel ciphers : security proofs and cryptanalysis
Comment Share
Nachef, ValeriePatarin, JacquesVolte, Emmanuel

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2,…

Edition
-
ISBN/ISSN
9783319495286
Collation
xv, 309 hlm.: ilus.; 24 cm
Series Title
-
Call Number
005.82 NAC f
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?