Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Cyber reconnaissance, surveillance, and defense
Comment Share
Shimonski, Robert

Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…

Edition
1st edition
ISBN/ISSN
9780128013083
Collation
xv, 241 hal.; ilus.; 24 cm
Series Title
--
Call Number
327.12 SHI c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber guerilla
Comment Share
Van Haaster, JelleGevers, RickeySprengers, Martijn

Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…

Edition
1st edition
ISBN/ISSN
9780128051979
Collation
xiv, 128 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 HAA c
Availability1
Add to basket
MARC DownloadCite
cover
Network intrusion detection
Comment Share
Northcutt, StephenNovak, Judy

Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …

Edition
Third Edition
ISBN/ISSN
0735712654
Collation
xvii, 490 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 NOR n
Availability2
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9781441926746
Collation
xv, 523 hlm.; 24 cm
Series Title
--
Call Number
652.8 HOF u2
Availability1
Add to basket
MARC DownloadCite
cover
Applied cryptography: protocols, algorithms, and source code in C
Comment Share
Schneier, Bruce

Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…

Edition
Second Edition
ISBN/ISSN
9780471117094
Collation
xxiii, 758 hlm.; 24 cm.
Series Title
--
Call Number
005.82 SCH a
Availability12
Add to basket
MARC DownloadCite
cover
An introduction to mathematical cryptography
Comment Share
Hoffstein, JeffreyPipher, JillSilverman, Joseph H.

Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.

Edition
--
ISBN/ISSN
9780387779935
Collation
xv, 523 hlm.; 24 cm.
Series Title
--
Call Number
652.8 HOF i
Availability5
Add to basket
MARC DownloadCite
cover
The Basic of hacking and penetration testing: ethical hacking and penetration…
Comment Share
Enggebretson, Patrick

Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test

Edition
Second Edition
ISBN/ISSN
9780124116443
Collation
xviii, 204 hlm: ilus.; 23 cm
Series Title
--
Call Number
005.84 ENG b
Availability2
Add to basket
MARC DownloadCite
cover
Hukum tata negara Indonesia
Comment Share
Ni'matul Huda

DAFTAR ISI 1. Pendahuluan - Lingkp kajian HTN - Pengertian HTN dan hubungannya dengan HAN - Hubungan HTN dengan ilmu negara dan ilmu politik 2. Sumber-sumber hukum tata negara - Pengertian sumber hukum - Macam-macam sumber hukum - Sumber hukum tata negara - Hierarki Peraturan Peundang-undangan RI - Hierarki menurut UU No.10 Tahun 2004 - Hierarki menurut UU No.12 Tahun 2…

Edition
Edisi revisi
ISBN/ISSN
9789797690121
Collation
xiii, 387 hal.; 21 cm.
Series Title
--
Call Number
342.598 NI' h
Availability1
Add to basket
MARC DownloadCite
cover
Proyek aplikasi Android dengan Visual Studio Xamarin & Codeigniter
Comment Share
Ipung Purwono

DAFTAR ISI BAB 1. Tentang Aplikasi Pariwisata 1.1. Alur Aplikasi Informasi Pariwisata pada Sisi Client 1.2. Alur Aplikasi Admin untuk Web Services 1.3. Prototype Aplikasi Android Pariwisata BAB 2. Perancangan Database Aplikasi Pariwisata 2.1. Struktur Database Aplikasi Pariwisata 2.2. Membuat Database Aplikasi Pariwisata di MySQL 2.3. Konvensi pada Database Aplikasi Pariwisata BA…

Edition
--
ISBN/ISSN
9786026231154
Collation
viii, 222 hal.; ilus.; 21 cm.
Series Title
--
Call Number
005.43 IPU p
Availability1
Add to basket
MARC DownloadCite
cover
Information technology and the U.S. workforce: where are we and where do we g…
Comment Share
Committee on Information Technology Automation, and the U.S. Workforce

Table of contents: 1. Introduction 2. The technological landscape 3. Effect of information technology on productivity, employment and incomes 4. Changes in the nature of work and its organization 5. Data sources and methods 6. Finding and a path forward 7. Conclusion

Edition
--
ISBN/ISSN
9780309454025
Collation
xiv, 184 hal.; ilus.; 23 cm
Series Title
--
Call Number
R004 COM i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?