Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 477 from your keywords: subject="Security"
First Page Previous 36 37 38 39 40 Next Last Page
cover
Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Comment Share
Haataja, KeijoHypponen, KonstantinPasanen, SannaToivanen, Pekka

Table of contents: 1.Introduction 2.Overview of Bluetooth Security 3.Reasons for Bluetooth Network Vulnerabilities 3.1.Vulnerability to Eavesdropping 3.2.Weaknesses in Encryption Mechanisms 3.3.Weaknesses in PIN Code Selection 3.4.Weaknesses in Association Models of SSP 3.5.Weaknesses in Device Configuration 4.Comparative Analysis of Bluetooth Security Attacks 4.1.Disclosure Threats …

Edition
--
ISBN/ISSN
9783642406454
Collation
93 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.6 HAA b
Availability1
Add to basket
MARC DownloadCite
cover
New stream cipher designs: the eSTREAM finalists
Comment Share
Robshaw, MatthewBillet, Olivier

Table of contents: 1. The eSTREAM Project 2. CryptMT3 Stream Cipher 3. The Dragon Stream Cipher: Design, Analysis, and Implementation Issues 4. The Stream Cipher HC-128 5. Design of a New Stream Cipher—LEX 6. Specification for NLSv2 7. The Rabbit Stream Cipher 8. The Salsa20 Family of Stream Ciphers 9. Sosemanuk, a Fast Software-Oriented Stream Cipher 10. eSTREAM Software Performanc…

Edition
--
ISBN/ISSN
9783540683506
Collation
viii, 293 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 ROB n
Availability1
Add to basket
MARC DownloadCite
cover
Applied network security monitoring: collection, detection, and analysis
Comment Share
Sanders, ChrisSmith, Jason

Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …

Edition
--
ISBN/ISSN
9780124172081
Collation
xxiv, 472 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.82 SAN a
Availability1
Add to basket
MARC DownloadCite
cover
The practice of network security monitoring: understanding incident detection…
Comment Share
Bejtlich, Richard

Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…

Edition
--
ISBN/ISSN
9781593275099
Collation
xxx, 341 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BEJ p
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Security operations center: building, operating, and maintaining your SOC
Comment Share
Muniz, JosephMclntyre, GaryAlfardan, Nadhem

Table of contents: 1. Introduction to security operations and the SOC 2. Overview of SOC technologies 3. Assessing security operations capabilities 4. SOC strategy 5. The SOC infrastructure 6. Security event generation and collection 7. Vulnerability management 8. People and processes 9. The technology 10. Preparing to operate 11. Reacting to events and incidents 12. Maintain, revie…

Edition
--
ISBN/ISSN
9780134052014
Collation
xxi, 424 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 MUN s
Availability1
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
CWSP certified wireless security professional study guide
Comment Share
Coleman, David D.Westcott, David AHarkins, Bryan

Table of contents: Chapter 1 WLAN Security Overview 1 Chapter 2 Legacy 802.11 Security 29 Chapter 3 Encryption Ciphers and Methods 61 Chapter 4 802.1X/EAP Authentication 87 Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151 Chapter 6 PSK Authentication 193 Chapter 7 802.11 Fast Secure Roaming 215 Chapter 8 WLAN Security Infrastructure 257 Chapter 9 RADIUS and LDAP 291 Chap…

Edition
Second Edition
ISBN/ISSN
9781119211082
Collation
xlvii, 645 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber-risk informatics: engineering evaluation with D\data science
Comment Share
Sahinoglu, Mehmet

Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …

Edition
--
ISBN/ISSN
9781119087519
Collation
xxxii, 526 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SAH c
Availability1
Add to basket
MARC DownloadCite
cover
Database security
Comment Share
Basta, AlfredZgola, Melissa

Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

Edition
--
ISBN/ISSN
9781435453906
Collation
x, 299 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 BAS d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 36 37 38 39 40 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?