Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 272 from your keywords: subject="Computer security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Cryptography apocalypse: preparing for the day when quantum computing breaks …
Comment Share
Grimes, Roger A.

Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way …

Edition
--
ISBN/ISSN
9781119618195
Collation
xxiv, 248 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.82 GRI c
Availability1
Add to basket
MARC DownloadCite
cover
Advances in cyber security: principles, techniques, and applications
Comment Share
Chen, XiaofengLi, Kuan-ChingSusilo, Willy

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authenticati…

Edition
--
ISBN/ISSN
9789811314827
Collation
xix, 255 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.82 LI a
Availability1
Add to basket
MARC DownloadCite
cover
Zero trust networks: building secure systems in untrusted networks
Comment Share
Gilman, EvanBarth, Doug

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be c…

Edition
First edition
ISBN/ISSN
9781491962190
Collation
xiv, 223 hlm : illus ; 24 cm
Series Title
--
Call Number
005.82 GIL z
Availability1
Add to basket
MARC DownloadCite
cover
Security fundamentals
Comment Share
Panek, Crystal

Security is one of the most important components to every company’s computer network. That’s why the Security Fundamentals MTA Certification is so highly sought after. Filling IT positions is a top problem in today’s businesses, so this certification could be your first step toward a stable and lucrative IT career. Security Fundamentals is your guide to developing a strong foundational un…

Edition
-
ISBN/ISSN
9781119650669
Collation
xviii, 284 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 PAN s
Availability1
Add to basket
MARC DownloadCite
cover
Management of information security
Comment Share
Whitman, Michael E.Mattord, Herbert J.

Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…

Edition
Fifth Edition
ISBN/ISSN
9781305501256
Collation
xxii, 650 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 WHI m
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
cover
Hardware security: a hands-on learning approach
Comment Share
Bhunia, SwarupTehranipoor, Mark

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The …

Edition
-
ISBN/ISSN
9780128124772
Collation
xxiii, 502 hlm.; ilus.; 23,5 cm
Series Title
--
Call Number
005.82 BHU h
Availability1
Add to basket
MARC DownloadCite
cover
Keamanan jaringan komputer
Comment Share
Didik Tristianto

Keamanan jaringan komputer adalah suatu model komputer tunggal yang melayani seluruh tugas-tugas komputasi suatu organisasi kini telah diganti degan sekumpulan computer yang terpisah-pisah akan tetapi saling berhubungan dalam melaksanakan tugasnya. Buku Keamanan Jaringan Komputer mengurai tentang networking, kemanan jaringan, konsep dasar kemanan komputer, kriptografi dan kriptanalisis. Keamana…

Edition
-
ISBN/ISSN
9786237715351
Collation
viii, 131 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 DID k
Availability1
Add to basket
MARC DownloadCite
cover
The pentester blueprint: starting a career as an ethical hacker
Comment Share
Wylie, Phillip LCrawley, Kim

Table of contents Cover Title Page Foreword Introduction How I Became a Pentester Who Should Read This Book What You Will Learn How This Book Is Organized 1 What Is a Pentester? Synonymous Terms and Types of Hackers Pentests Described Pentest Methodology Pentest Types Vulnerability Scanning Vulnerability Assessments Pentest Targets and Specializations Career Outlook Summ…

Edition
-
ISBN/ISSN
9781119684305
Collation
xx, 172 hlm; ilus.; 23 cm
Series Title
--
Call Number
005.1092 WYL t
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?