Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4417 from your keywords: subject="Jamming-and-Replay"
First Page Previous 36 37 38 39 40 Next Last Page
cover
A Guide to Data Compression Methods
Comment Share
David Salomon

In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him. Braille himself modified his code in 1834, and there have been several modifications since. However, the basic design of this code, where each character is represented by a group of 3 x 2 dots, has remained i…

Edition
cet 1
ISBN/ISSN
9780387952604
Collation
xii, 295 hal : ill. ; 24 cm.
Series Title
-
Call Number
005.74 SAL a
Availability1
Add to basket
MARC DownloadCite
cover
Kebijakan Publik;teori, proses, dan Studi kasus
Comment Share
Prof.Drs. Budi Winarno, MA, PhD

Perkembangan ilmu pengetahuan dan studi kebijakan publik maupun isu-isu yang berkaitan dengan kebijakan publik pada khususnya, telah mengalami dinamika dan perkembangan yang sangat pesat terlebih setelah memasuki era globalisasi. Demikian pula masalah, problem atau persoalan publik tidak saja menjadi semakin kompleks, tetapi juga menjadi rumit sejalan dengan meningkatnya berbagai masalah dan is…

Edition
Cetakan kedua
ISBN/ISSN
9786029324013
Collation
xvi.; 436 hlm.; 24 cm
Series Title
-
Call Number
320 BUD K
Availability3
Add to basket
MARC DownloadCite
cover
Cryptographic Libraries for Developers
Comment Share
Ed MoyleDiana Kelley

Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familia…

Edition
-
ISBN/ISSN
9781584504092
Collation
-
Series Title
programing series
Call Number
005.1 MOY c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Probability
Comment Share
Jim Pitman

This textbook is ideal for an undergraduate introduction to probability, with a calculus prerequisite. It is based on a course that the author has taught many times at Berkeley. The text's overall style is informal, but all results are stated precisely, and most are proved. Understanding is developed through intuitive explanations and examples. Graphs, diagrams, and geometrical ideals motivate …

Edition
-
ISBN/ISSN
9780387979748
Collation
xi, 559 p. : ill. ; 25 cm.
Series Title
-
Call Number
519.2 PIT p
Availability1
Add to basket
MARC DownloadCite
cover
Schneier on Security
Comment Share
Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…

Edition
-
ISBN/ISSN
9780470395356
Collation
328hal
Series Title
-
Call Number
005.80973 SCH s
Availability2
Add to basket
MARC DownloadCite
cover
Perancangan tata kelola teknologi informasi
Comment Share
Bambang Gunawan, S.E., S.T., M.M.Faisal Adrian Pratama

Pengelolaan teknologi informasi di berbagai organisasi merupakan salah satu bentuk perkembangan yang akan sangat membantu dan bermanfaat bukan hanya bagi perusahaan, namun juga bagi para stakeholder-nya. Tata kelola Teknologi informasi akan sangat membantu dalam berbagai hal, antara lain efisiensi, efektivitas, transparansi, hingga yang berhubungan dengan sumber daya manusia. Buku Perancangan T…

Edition
Ed.I
ISBN/ISSN
9789792970944
Collation
x, 150 hlm.; ilus.; 23 cm
Series Title
--
Call Number
004.0688 BAM p
Availability4
Add to basket
MARC DownloadCite
cover
Belajar otodidak windows forensic: untuk semua versi windows
Comment Share
Efvy Zamidra ZamSarjon Defit

Dalam melakukan kegiatan forensik terhadap sistem operasi Windows, kita tidak hanya menganalisa data yang tersimpan dalam hard disk saja, melainkan ada banyak komponen lainnya yang harus diinvestigasi, mulai dari memori (RAM), aplikasi, proses file sistem dan sebagainya. BAB 1 Windows forensic BAB 2 Membongkar identitas komputer BAB 3 Menggali data menggunakan pstools BAB 4 Forensic im…

Edition
Pertama
ISBN/ISSN
9786020476674
Collation
xii, 300 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.43 SAR b
Availability2
Add to basket
MARC DownloadCite
cover
Cyber warfare sudah siapkah kita menghadapinya
Comment Share
Rudy Gultom

Saat ini, cyber warfare mungkin masih dikategorikan sebagai perang berskala rendah (low-level warfare), namun bisa menjadi bentuk peperangan yang sebenarnya (the real warfare). Dalam buku ini penulis membahas mengenai berbagai pemikiran strategis konsep terkait pengelolaan serta membangun lingkungan keamanan siber, hingga bagaimana memahami tantangan keamanan global.

Edition
-
ISBN/ISSN
9786025808197
Collation
xxxiv.; 422 hlm : 24cm
Series Title
-
Call Number
355.4 GUL c
Availability1
Add to basket
MARC DownloadCite
cover
Merancang Aplikasi Dengan Metodologi Extreme Programmings
Comment Share
I Gusti Ngurah Suryantara

Edition
-
ISBN/ISSN
978-602-04-2102-5
Collation
x, 400 hlm.; 21 cm
Series Title
-
Call Number
004 IPU m

Edition
-
ISBN/ISSN
978-602-04-2102-5
Collation
x, 400 hlm.; 21 cm
Series Title
-
Call Number
004 IPU m
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?