Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Recent advances in RSA cryptography
Comment Share
Katzenbeisser, Stefan

Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures

Edition
--
ISBN/ISSN
9781461355502
Collation
xiii, 139 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAT r
Availability1
Add to basket
MARC DownloadCite
cover
Differential cryptanalysis on hash functions: theory and practice (attack alg…
Comment Share
Tao, XieFanbao, Liu

Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research

Edition
--
ISBN/ISSN
9783659612008
Collation
xiv, 362 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 TAO d
Availability1
Add to basket
MARC DownloadCite
cover
Cryptanalysis of RSA and its variants
Comment Share
Hinek, M. Jason

Contents: I. Preliminaries 1. The RSA Cryptosystem 2. Some Notation, Mathematics and Techniques II. Cryptanalysis of RSA 3. Some Early Attacks 4. Small Public Exponent Attacks 5. Small Private Exponent Attacks 6. Partial Key Exposure Attacks 7. More Small Private Exponent Attacks III. Cryptanalysis of Variants of RSA 8. Crt-Rsa 9. Multi-Prime RSA 10. Multi-Power RSA 1…

Edition
--
ISBN/ISSN
9781420075182
Collation
xviii, 268 hlm.: 25 cm.
Series Title
--
Call Number
005.82 HIN c
Availability3
Add to basket
MARC DownloadCite
cover
Internet security: cryptographic principles, algorithms, and protocols
Comment Share
Man, Young Rhee

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i
Availability9
Add to basket
MARC DownloadCite
cover
Introduction to cryptography: principles and applications
Comment Share
Delfs, HansKnebl, HelmutMaurer, Ueli

Termasuk bibliografi dan indeks. Guide to elliptic curve cryptography / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes. Computer security. Public key cryptography. ContentsList of Algorithms List of Tables List of Figures Acronyms CONTENTS: 1. Introduction 1.1 Encryption and Secrecy 1.2 The Objectives of Cryptography 1.3 Attacks 1.4 Cryptographic Protocols 1.5 P…

Edition
Second Edition
ISBN/ISSN
9783540492436
Collation
xvi, 367 hlm.; ilus.; 24 cm.
Series Title
--
Call Number
005.82 DEL i
Availability3
Add to basket
MARC DownloadCite
cover
Pedoman praktis keamanan informasi untuk pengguna rumah & individu: 9 rekomen…
Comment Share
Juliati Junde

Daftar isi: Pendahuluan Sembilan hal penting untuk diketahui Langkah 1: Pasang dan gunakan program anti-virus Langkah 2: Lakukan patch pada sistem anda Langkah 3: Hati-hati dalam membaca email dengan attachment Langkah 4: Pasang dan gunakan program firewall Langkah 5: Lakukan backups untuk file dan folder penting Langkah 6: Gunakan password yang kuat Langkah 7: Hati-hati ketika downl…

Edition
Cetakan keempat
ISBN/ISSN
--
Collation
v, 42 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 JUL p
Availability1
Add to basket
MARC DownloadCite
cover
Step by step wireless hacking
Comment Share
Efvy Zam

DAFTAR ISI: 1. Sekilas jaringan wireless 1.1 Teknologi jaringan wireless 1.2 Mekanisme jaringan wireless 1.2.1 Beacon 1.2.2 Service set identifier (SSID) 1.2.3 Channel 1.2.4 Passive scanning 1.2.5 Autentifikasi dan association 1.2.6 Roaming 1.3 Seputar wireless dan hacking 2. Persiapan perang 2.1 Seputar chipset 2.2 Memeriksa chipset 2.3 Membongkar jeroan perangkat wireless …

Edition
--
ISBN/ISSN
9786020256313
Collation
ix, 218 hlm.; ilus.; 21 cm. + 1 CD
Series Title
--
Call Number
005.84 EFV s
Availability1
Add to basket
MARC DownloadCite
cover
The basics of information security: understanding the fundamentals of infosec…
Comment Share
Andress, Jason

Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…

Edition
Second Edition
ISBN/ISSN
9780128007440
Collation
xxi, 217 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 AND b
Availability1
Add to basket
MARC DownloadCite
cover
Modern cryptography primer: theoretical foundations dan practical applications
Comment Share
Koscielny, CzeslawKurkowski, MiroslawSrebrny, Marian

Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security

Edition
--
ISBN/ISSN
9783642413858
Collation
xiv, 238 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 KOS m
Availability1
Add to basket
MARC DownloadCite
cover
IT security metrics: a practical framework for measuring security dan protect…
Comment Share
Hayden, Lance

Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…

Edition
--
ISBN/ISSN
9780071713412
Collation
xxvii, 368 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 HAY i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?