Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 24 from your keywords: subject="SHA"
First Page Previous 1 2 3
cover
Rancang bangun platform Information Sharing and Analysis Center (ISAC) berbas…
Comment Share
Hermawan SetiawanHerman KabettaIntan Maratus SholihahRay Novita Yasa

Serangan siber menjadi fokus utama yang disoroti pada semua negara di dunia, baik sektor private maupun public. Hal tersebut menjadi alasan bagi setiap negara untuk memperbaiki dan mengembangkan segala sesuatu yang ada pada teknologi siber balik dalam segi pertahanan ataupun penyerangan. Salah satu solusi yang ditawarkan adalah dengan membangun platform yang dapat digunakan untuk melakukan info…

Edition
--
ISBN/ISSN
--
Collation
xiv, 81 hlm
Series Title
-
Call Number
2021 INT r
Availability2
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Practical packet analysis: using Wireshark to solve real-world network problems
Comment Share
Sanders, Chris

Table of Contents Chapter 1 Packet Analysis and Network Basics Packet Analysis and Packet Sniffers How Computers Communicate Traffic Classifications Final Thoughts Chapter 2 Tapping into the Wire Living Promiscuously Sniffing Around Hubs Sniffing in a Switched Environment Sniffing in a Routed Environment …

Edition
2nd Edition
ISBN/ISSN
9781593272661
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.66 SAN p
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi Mel Frequency Cepstral Coefficient (MFCC) dan Hidden Markov Mode…
Comment Share
Fetty Amelia

Pengamanan informasi dapat dilakukan dengan cara membatasi akses terhadap pihak-pihak yang tidak berkepentingan, yaitu dengan menggunakan teknik otentikasi. Teknik yang populer sampai saat ini adalah menggunakan input-an berupa username dan password. Namun penggunaan hal tersebut memiliki banyak kerawanan. Oleh karena itu, biometric hadir sebagai solusi terhadap permasalahan tersebut. Biometric…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 FET i
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?