Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 78 from your keywords: subject="Data Encryption"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Quantum computational number theory
Comment Share
Yan, Song Y.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…

Edition
-
ISBN/ISSN
9783319798462
Collation
ix, 252 hlm.: ilus.; 23 cm
Series Title
-
Call Number
512.7 YAN q
Availability1
Add to basket
MARC DownloadCite
cover
Post-quantum cryptography
Comment Share
Bernstein, Daniel J.Buchmann, JohannesDahmen, Erik

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …

Edition
-
ISBN/ISSN
9783540887010
Collation
viii, 245 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R005.82 BER p
Availability3
Add to basket
MARC DownloadCite
cover
Writing secure code
Comment Share
Howard, Michael

Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…

Edition
Second Edition
ISBN/ISSN
0735617228
Collation
xxviii, 768 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 HOW w
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Kriptografi dan implementasinya menggunakan MATLAB
Comment Share
Emy Setyaningsih

Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…

Edition
Ed. I
ISBN/ISSN
9789792951516
Collation
xxii, 250 hal.; ilus.; 28 cm
Series Title
--
Call Number
005.82 EMY k
Availability1
Add to basket
MARC DownloadCite
cover
Multimedia information hiding technologies and methodologies for controlling …
Comment Share
Kondo, Kazuhiro

Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …

Edition
--
ISBN/ISSN
9781466622173
Collation
xxii, 473 hal.; ilus.; 29 cm
Series Title
--
Call Number
005.82 KON m
Availability1
Add to basket
MARC DownloadCite
cover
Information hiding text in image: encryption
Comment Share
Hasan, HaithamKareem, Sameem AbdulJaleel, Jane

Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…

Edition
--
ISBN/ISSN
9783659288487
Collation
xv, 88 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 HAS i
Availability1
Add to basket
MARC DownloadCite
cover
New directions of modern cryptography
Comment Share
Cao, Zhenfu

Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…

Edition
--
ISBN/ISSN
9781466501386
Collation
xv, 384 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CAO n
Availability1
Add to basket
MARC DownloadCite
cover
Digital watermarking and steganography: fundamentals and techniques
Comment Share
Shih, Frank Y.

Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …

Edition
Second Edition
ISBN/ISSN
9781498738767
Collation
xxii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SHI d
Availability0
Add to basket
MARC DownloadCite
cover
Blockchain: dari bitcoin untuk dunia
Comment Share
Dimaz Ankaa WijayaOscar Darmawan

DAFTAR ISI Bab 1 Pendahuluan 1.1. Cypherpunk 1.2. Uang 1.3. Basis data 1.4. Kriptografi Bab 2 Blockchain 2.1. Gambaran umum 2.2. Konsensus 2.3. Tipe blockchain 2.4. Keamanan Bab 3 Bitcoin 3.1. Sejarah bitcoin 3.2. Satoshi Nakamoto 3.3. Desentralisasi 3.4. Definisi bitcoin 3.5. Suplai terbatas 3.6. Transaksi bitcoin 3.7. Dompet bitcoin 3.8. Bitcoin blockchain explorer 3…

Edition
--
ISBN/ISSN
9786020823263
Collation
xv, 261 hal.; ilus.; 21 cm.
Series Title
--
Call Number
005.8 DIM b
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?