Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4436 from your keywords: subject="Jamming-and-Replay"
First Page Previous 371 372 373 374 375 Next Last Page
cover
Information security
Comment Share
Gerhart, BarryStamp, MarkWright, Patrick M.

Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…

Edition
null
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.8 STA i
Availability5
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability1
Add to basket
MARC DownloadCite
cover
Social engineering - the art of human hacking
Comment Share
Christopher Hadnagy

A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.

Edition
null
ISBN/ISSN
9780470639535
Collation
--
Series Title
--
Call Number
005.8 HAD s
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Forozan, Behrouz A.Rush, Michael

Part 1: Symmetric Key Encipherment Chapter 2: Mathematics of Cryptography Chapter 3: Traditional Symmetric Key Ciphers Chapter 4: Mathematics of Cryptography Chapter 5: Introduction to Modern Symmetric-Key Ciphers Chapter 6: Data Encryption Standard (DES) Chapter 7: Advanced Encryption Standard Chapter 8: Encipherment Using Modern Symmetric Key Ciphers Part 2: Asymmetric Key Encipherme…

Edition
first
ISBN/ISSN
9780073327532
Collation
xxvi,721hal .; ilus .; 24cm
Series Title
null
Call Number
005.8 FOR i
Availability1
Add to basket
MARC DownloadCite
cover
Blue team handbook: incident response editions
Comment Share
Gilang PriyadiAgus SriyonoMurdoch, Don

computer security

Edition
first
ISBN/ISSN
9781500734756
Collation
iv,146hal.;ilus.;23cm
Series Title
null
Call Number
005.8 MUR b
Availability1
Add to basket
MARC DownloadCite
cover
The Art of memory forensics
Comment Share
Case, AndrewLevy, JamieLigh, Michael HaleTimWalters, Aaron

Detecting malware adn threats in windows, linux and Mac

Edition
first
ISBN/ISSN
9781118825099
Collation
xxiii,886hal.;ilus.;23,5cm
Series Title
null
Call Number
005.8 LIG a
Availability1
Add to basket
MARC DownloadCite
cover
Javascript & Jquery interactive front-end web development
Comment Share
Bambang AbimanyuDuckett, JonJohnson, David W. Johnson, Frank P.

null

Edition
first
ISBN/ISSN
9781118531648
Collation
iv,622 hal. ;illus. ; 23,5cm
Series Title
null
Call Number
005.262 DUC j
Availability1
Add to basket
MARC DownloadCite
cover
Assitive technologies and computer accsess for motor disabilities
Comment Share
Jonathan SarwonoLemhanasKouroupetrologlou, Georgegos

null

Edition
first
ISBN/ISSN
9781466644380
Collation
x,415hal.;ilus.;29cm
Series Title
the Advances in medical technologies and clinical practice book series ATMCP
Call Number
617.03 KOU a
Availability1
Add to basket
MARC DownloadCite
cover
Sehat dan ceria di usia senja
Comment Share
Canfield, JackCovey, Stephen R.Fairano IlyasRonald Hutapea

null

Edition
null
ISBN/ISSN
9795189441
Collation
ix, 241 hlm; ilus; 20 cm
Series Title
Buku 2
Call Number
362.6 RON s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 371 372 373 374 375 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?