Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 467 from your keywords: subject="Security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Security, Privacy, and Applied Cryptography Engineering : 12th International …
Comment Share
Batina, LejlaMondal, MainackPicek, Stjepan

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key crypt…

Edition
-
ISBN/ISSN
9783031228292
Collation
340 hal ; 23cm
Series Title
-
Call Number
005.8 BAT s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Threat Intelligence : The No-Nonsense Guide for CISOs and Security Mana…
Comment Share
Aaron Robert

Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization's resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develo…

Edition
-
ISBN/ISSN
9781484272206
Collation
xxii, 205 hal : 23cm
Series Title
-
Call Number
005.8 ROB c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Education : Principles and Policies
Comment Share
Austin, Greg

"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of …

Edition
-
ISBN/ISSN
9780367822576
Collation
xx, 225 hal : 23cm
Series Title
-
Call Number
005.8071
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in MATLAB: creating and programming advanced a…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing …

Edition
-
ISBN/ISSN
9781484273340
Collation
xiii, 194 hal : 23 cm
Series Title
--
Call Number
652.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security : Cyber Security and Digital Forensics: Challenges…
Comment Share
Ghonge Mangesh M.,, Mangrulkar Ramchandra, LLe Dac-Nhuong

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a
Availability2
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
cover
Modifikasi Skema Proxy Re-enkripsi Menggunakan Grup Kurva Eliptik
Comment Share
Bety Hayat SusantiSri RosdianaIndah Emilia WijayantiGalang Mardani

Edition
-
ISBN/ISSN
--
Collation
xvi, 55 hal
Series Title
-
Call Number
2024 GAL m

Edition
-
ISBN/ISSN
--
Collation
xvi, 55 hal
Series Title
-
Call Number
2024 GAL m
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?