Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Analisis Keamanan Aplikasi Situs Web Sistem Informasi Dokumen Elektronik (SID…
Comment Share
Susila WindartaAmiruddinIra Rosianal HikmahIlham Dwi Harjanto

Sistem Informasi Dokumen Elektronik (SIDOEL) adalah aplikasi situs web milik PT Angkasa Pura II dirancang untuk mengelola dokumen dan arsip secara elektronik, memudahkan karyawan dalam pengelolaan dokumen. Meskipun upaya mitigasi telah dilakukan melalui vulnerability assessment dan penetration testing, pemindaian pada Oktober 2023 masih menemukan kerentanan dalam sistem ini. Penelitian ini ber…

Edition
-
ISBN/ISSN
--
Collation
xiv + 91 hal
Series Title
-
Call Number
2024 ILH a
Availability2
Add to basket
MARC DownloadCite
cover
Analisis Formal Protokol MPKE pada Wireless Mesh Network Menggunakan ProVerif
Comment Share
Sri RosdianaYeni FaridaNia YuliantiTsamara Khadijah Silim

Protokol MPKE pada Wireless Mesh Network (WMN) merupakan protokol banyak pihak yang menggunakan tiket dalam proses autentikasi. Protokol MPKE dibuat oleh Roy et al. pada tahun 2022 yang ditujukan untuk proses autentikasi pada saat handover dari Home Mesh Access Point (HMAP) ke Foreign Mesh Access Point (FMAP). Protokol ini dapat diterapkan pada perangkat yang terhubung ke dalam suatu jaringan r…

Edition
-
ISBN/ISSN
--
Collation
xvi, 65 hal
Series Title
-
Call Number
2024 TSA a
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Computer security
Comment Share
Dony Ariyus

Daftar Isi: BAB I PENDAHULUAN 1.1 Aspek-aspek keamanan komputer 1.2 Aspek-aspek ancaman keamanan 1.3 Metodologi keamanan 1.4 Mendeteksi serangan 1.5 Mencegah 1.6 Lima langkah keamanan Komputer 1.7 Strategi dan dan taktik keamanan komputer 1.8 Password BAB II KEJAHATAN KOMPUTER 2.1 Pendahuluan 2.2 Macam-macam Serangan BAB III DASAR-DASAR KEAMANAN KOMPUTER 3.1 Apa itu Kriptogr…

Edition
Ed. I
ISBN/ISSN
979763163X
Collation
xvi, 381 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DON c
Availability3
Add to basket
MARC DownloadCite
cover
Cybersecurity risk management: an enterprise risk management approach
Comment Share
Kok-Boon OhBruce Ho

The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk management in general to raise awareness among businesses, academics, and the general public about the cyber landscape changes and challenges that are occurring with emerging threats that will affect individual and corporate information security. As a result, the …

Edition
-
ISBN/ISSN
9781685074289
Collation
xviii, 244 ; ilus :25cm
Series Title
-
Call Number
005.8 KOK c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to modern cryptography, tird edition
Comment Share
Jonathan katzYehuda Lindell

Introduction to Modern Cryptography is an introductory-level treatment of cryptography written from a modern, computer science perspective. It is unique in its blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. It is intended to be used as a textbook in undergraduate- or graduate-level introductory c…

Edition
Third edition
ISBN/ISSN
9780815354369
Collation
xx, 626 hal : 26 cm
Series Title
-
Call Number
005.8 KAT i
Availability1
Add to basket
MARC DownloadCite
cover
From data science to AI ; Technology Augmented human capacity, knowledge & ap…
Comment Share
Rudi Rusdiah MaAngela Shirley SindunataAnton Adam Nangoy

Teknologi Big data & Artificial Intelligence (AI) sub study Data Science & bagian vital Revolusi industri 4.0 semakin banyak dibaca dan juga ditulis di buku ini, oleh Akademisi, Profesional Muda, Aparatur Pemerintah (ASN) & Eksekutif yang mendorong Transformasi digital dari Startup hingga BUMN dan Unicorn, bahkan Decacorn. Buku Wajib bagi Digital Native Milenia yang dari sejak lahir (digital…

Edition
-
ISBN/ISSN
9786239267230
Collation
xxiii, 262 hal ; 24 cm
Series Title
-
Call Number
005.8
Availability1
Add to basket
MARC DownloadCite
cover
Complexity theory and cryptology: an introduction to cryptocomplexity
Comment Share
Rothe, Jorg

Contents 1 Introduction to Cryptocomplexity 2 Foundations of Computer Science and Mathematics 3 Foundations of Complexity Theory 4 Foundations of Cryptology 5 Hierarchies Based on NP 6 Randomized Algorithms and Complexity Classes 7 RSA Cryptosystem, Primality, and Factoring 8 Other Public-Key Cryptosystems and Protocols References

Edition
--
ISBN/ISSN
9783540221470
Collation
xi, 481 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ROT c
Availability2
Add to basket
MARC DownloadCite
cover
Practical cryptography
Comment Share
Ferguson, NielsSchneier, Bruce

Terdapat indeks. Table of contents: 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I_ Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II_ Key Negotiation. 10. Generating Rando…

Edition
First edition
ISBN/ISSN
9780471223573
Collation
xx, 410 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 FER p
Availability10
Add to basket
MARC DownloadCite
cover
Penanganan keamanan jaringan komputer
Comment Share
Bambang Kelana SimponyKyla Salwa Putri DenillaRatu Riqsa Aqidah RidwanMuhammad Ikhsan

Buku ini membahas tiga hal penting yang saling berkaitan dalam lingkup ilmu komputer. Pertama membahas tentang Keamanan Jaringan Komputer dimulai dari pembahasan dasar keamanan jaringan komputer, dasar dalam keamanan sistem informasi, firewall, malware pada jaringan komputer, sampai ke pembahasan keamanan mail server, dan tidak hanya itu membahas juga keamanan pada jaringan nirkabel. Hal kedua …

Edition
Ed.1
ISBN/ISSN
9786236433188
Collation
xi, 112 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAM p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?