Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Counterterrorism and cybersecurity: total information awareness
Comment Share
Lee, Newton

Contents: Part I Counterterrorism in retrospect: then and now 1 September 11 attacks 2 U.S. intelligence community Part II Counterterrorism technologies: total information awareness 3 The rise fall of total information awareness 4 The afterlife of total information awareness 5 Artificial intelligence and data mining Part III Counterterrorism technologies: social media nad cyberse…

Edition
--
ISBN/ISSN
9781489986733
Collation
xii, 234 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.3 LEE c
Availability1
Add to basket
MARC DownloadCite
cover
Electromagnetic compatibility: analysis and case studies in transportation
Comment Share
Baker, Donald G.

Contents: 1 Introduction 2 Fundamentals of coupling culprit to victim 3 Introduction to Electromagnetic fields 4 Case studies and analysis in transportation systems 5 Case studies and analysis of LRT vehicle and top antenna farm emissions and other radio related case studies 6 Case studies and analysis of comminications equipment and cable shielding and grounding for bus …

Edition
--
ISBN/ISSN
9781118985397
Collation
xiv, 392 hal.; ilus.; 24 cm
Series Title
--
Call Number
629.04 BAK e
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security and privacy
Comment Share
Felici, Massimo

Contents: Cloud computing Towards trustworthiness assurance in the cloud Security and privacy in mobile cloud under a citizen’s perspective Bringing accountability to the cloud: addressing emerging threats and legal perspectives Introducing life management platforms and collaborative service fusion to contextual environments Security and privacy management Integrating…

Edition
--
ISBN/ISSN
9783642412042
Collation
xiv, 177 hal.; ilus.; 24 cm
Series Title
Communications in computing and information science
Call Number
R005.8 FEL c
Availability2
Add to basket
MARC DownloadCite
cover
Cyber security engineering: a practical approach for systems and software ass…
Comment Share
Mead, Nancy R.Woody, Carol C.

Contents: Chapter 1 Cyber security engineering: lifecycle assurance of systems and software 1.1 Intoduction 1.2 What do we mean by lifecycle assurance 1.3 Introducing principles for software assurance 1.4 Addressing lifecycle assurance 1.5 Case studies used in this book Chapter 2 Risk analysis-identifying and prioritizing needs 2.1 Risk management concepts 2.2 Mission risk 2.3 Mi…

Edition
--
ISBN/ISSN
9780134189802
Collation
xxiii, 352 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 MEA c
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity for beginners
Comment Share
Meeuwisse, Raef

Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…

Edition
Second Edition
ISBN/ISSN
9781911452034
Collation
xviii, 206 hal.; 23 cm
Series Title
--
Call Number
005.8 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber security: deterrence and IT protection for critical infrastructures
Comment Share
Martellini, Maurizio

Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures

Edition
--
ISBN/ISSN
9783319022789
Collation
xiv, 72 hal.; ilus.; 24 cm.
Series Title
Springer briefs in computer science
Call Number
005.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS
Comment Share
Macaulay, TysonSinger, Bryan

Contents: 1. Introduction 1.1 Where This Book Starts and Stops 1.2 Our Audience 1.3 What Is an Industrial Control System? 1.4 Is Industrial Control System Security Different Than Regular IT Security? 1.5 Where Are ICS Used? 1.6 ICS Compared to Safety Instrumented Systems 1.7 What Has Changed in ICS That Raises New Concerns? 1.8 Naming, Functionality, and Components of Typical ICS / SCA…

Edition
--
ISBN/ISSN
9781439801963
Collation
x, 192 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.4 MAC c
Availability2
Add to basket
MARC DownloadCite
cover
Digital forensics and incident response: a practical guide to deploying digit…
Comment Share
Johansen, Gerard

Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…

Edition
--
ISBN/ISSN
9781787288683
Collation
v, 308 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOH d
Availability1
Add to basket
MARC DownloadCite
cover
Undocumented secrets of Matlab-Java programming
Comment Share
Altman, Yair

Contents: Chapter 1 Introduction to java in MATLAB 1.1 Creating java objects 1.2 Java objects properties 1.3 Java object methods and actions 1.4 Java event and matlab callbacks 1.5 Safe java programming in matlab-a how-to guide 1.6 Compling and debugging user-created java classes in matlan 1.7 Compatibility issue 1.8 Java versions in matlab 1.9 Java.ops References Chapter 2 Usin…

Edition
--
ISBN/ISSN
9781439869031
Collation
xxi, 663 hal.; ilus.; 26 cm
Series Title
--
Call Number
518.0285 ALT u
Availability1
Add to basket
MARC DownloadCite
cover
Quantum information theory
Comment Share
Wilde, Mark M.

Contents: Part I Introduction 1 Concepts in quantum shannon theory 2 Classical shannon theory Part II The quantum theory 3 The quantum theory 4 The noisy quantum theory 5 The purified quantum theory Part III Unit quantum protocols 6 Three unit quantum protocols 7 Coherent protocols 8 Unit resource capacity region Part IV Tools of quantum Shannon theory 9 Distance m…

Edition
Second edition
ISBN/ISSN
9781107176164
Collation
xvii, 757 hal.; ilus.; 25 cm
Series Title
--
Call Number
003.54 WIL q
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?