Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 118 from your keywords: subject="Computer Science"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Quantum computational number theory
Comment Share
Yan, Song Y.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…

Edition
-
ISBN/ISSN
9783319798462
Collation
ix, 252 hlm.: ilus.; 23 cm
Series Title
-
Call Number
512.7 YAN q
Availability1
Add to basket
MARC DownloadCite
cover
Theory of modeling and simulation: discrete event & iterative system computat…
Comment Share
Zeigler, Bernard P.Muzy, AlexandreKofman, Ernesto

Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the in…

Edition
3rd Edition
ISBN/ISSN
9780128133705
Collation
xxiv, 667 hlm.: ilus.; 23 cm
Series Title
-
Call Number
003.3 ZEI t
Availability1
Add to basket
MARC DownloadCite
cover
Bahan ajar pemrograman berorientasi objek
Comment Share
Prasetyo Adi Wibowo PutroHerman KabettaRaden Budiarto Hadiprakoso

DAFTAR ISI 1 Dasar Pemrograman Berorientasi Objek 1.1 Paradigma Pemrograman 1.1.1 Imperatif dan Deklaratif 1.1.2 Pemrograman Terstruktur 1.1.3 Pemrograman Prosedural 1.2 Pemrograman Berorientasi Objek 1.3 Konsep Dasar PBO 1.3.1 Objek dan Kelas 1.3.2 Encapsulation 1.3.3 Inheritance 1.3.4 Polymorphism 1.4 Bahasa Pemrograman Berorientasi Objek 1.5 Perbedaan PBO…

Edition
-
ISBN/ISSN
-
Collation
ix, 438 hlm.; ilus.; 30 cm.
Series Title
-
Call Number
005.11 RAD b
Availability3
Add to basket
MARC DownloadCite
cover
Bahan ajar algoritma pemrograman lanjut
Comment Share
Hermawan SetiawanYogha Restu PramadiHerman Kabetta

DAFTAR ISI BAB 1 POHON A. Tujuan Pembelajaran B. Pendahuluan C. Traversal D. Pohon Biner E. Operasi Pohon Biner F. Praktikum G. Evaluasi BAB 2 PENCARIAN POHON BINER A. Tujuan Pembelajaran B. Pendahuluan C. Kelebihan dan kekurangan pencarian pohon biner D. Pohon AVL (Adelson, Velskii dan Landisr) E. Implementasi pencarian pohon biner F. Implementasi pencarian pohon b…

Edition
-
ISBN/ISSN
-
Collation
137 hlm.; ilus.; 30 cm
Series Title
-
Call Number
005.73 YOG b
Availability3
Add to basket
MARC DownloadCite
cover
Bahan ajar pemrograman terstruktur
Comment Share
Hermawan SetiawanPrasetyo Adi Wibowo PutroI Komang Setia Buana

DAFTAR ISI BAB 1 KONSEP PEMROGRAMAN TERSTRUKTUR/PROSEDURAL A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Perkembangan Pemrograman D. Proses pengembangan perangkat lunak/software E. Ciri-ciri dan Konsep Pemrograman Terstruktur F. Soal Latihan BAB 2 TIPE DATA , VARIABEL, KONSTANTA, DAN I/O A. Tujuan Pembelajaran B. Pendahuluan C. Pengenalan bahasa C dan tools yang digun…

Edition
-
ISBN/ISSN
-
Collation
vi, 128 hlm.; ilus.; 30 cm
Series Title
-
Call Number
005.73 HER b
Availability3
Add to basket
MARC DownloadCite
cover
Post-quantum cryptography
Comment Share
Bernstein, Daniel J.Buchmann, JohannesDahmen, Erik

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …

Edition
-
ISBN/ISSN
9783540887010
Collation
viii, 245 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
R005.82 BER p
Availability3
Add to basket
MARC DownloadCite
cover
Writing secure code
Comment Share
Howard, Michael

Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…

Edition
Second Edition
ISBN/ISSN
0735617228
Collation
xxviii, 768 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 HOW w
Availability1
Add to basket
MARC DownloadCite
cover
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
Comment Share
Kubasiak, Ryan RMorrissey, SeanVarsalone, JesseBarr, WalterBrown, James KellyCaceres, MaxChasman, MikeCornell, James

Terdapat indeks. Table of contents: 1. Tiger and Leopard Mac OS X operating systems 2. Getting a handle on Mac hardware 3. Mac disks and partitioning 4. HFS plus file system 5. FileVault 6. Time machine 7. Acquiring forensic images 8. Recovering browser history 9. Recovery of e-mail artifacts, iChat, and other chat logs 10. Locating and recovering photos 11. Finding and recovering…

Edition
--
ISBN/ISSN
9781597492973
Collation
xix, 551 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 KUB m
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practice
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems Pa…

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability0
Add to basket
MARC DownloadCite
cover
The IDA pro book: the unofficial guide to the world's most popular disassembler
Comment Share
Eagle, Chris

Table of contents: Pt. I. Introduction to IDA Ch. 1. Introduction to Disassembly Ch. 2. Reversing and Disassembly Tools Ch. 3. IDA Pro Background Pt. II. Basic IDA Usage Ch. 4. Getting Started with IDA Ch. 5. IDA Data Displays Ch. 6. Disassembly Navigation Ch. 7. Disassembly Manipulation Ch. 8. Datatypes and Data Structures Ch. 9. Cross-References and Graphing Ch. 10. The Many Faces…

Edition
2nd Edition
ISBN/ISSN
9781593271787
Collation
xxv, 608 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.14 EAG i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?