Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 1057 from your keywords: subject="Na"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Pseudorandomness and cryptographic applications
Comment Share
Michael Luby.

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that “looks” just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functi…

Edition
-
ISBN/ISSN
9780691025469
Collation
xvi, 234 hal : 23 cm
Series Title
-
Call Number
005.82 LUB p
Availability2
Add to basket
MARC DownloadCite
cover
Dari lembah tidar : pengabdian kami bermula
Comment Share
Apul D. Maharadja

Buku ini sepenuhnya berisi pengalaman, pengorbanan, kejayaan serta fakta-fakta yang dahulu, dua puluh tahun lalu, masih tidak terungkap tetapi sekarang dikategorikan sebagai now it can be told. Boleh diungkapkan agar tidak hilang ditelan oleh perjalanan waktu. Tentu saja banyak cerita yang lucu dan pengalaman menarik para perwira tersebut selama mengabdikan diri dalam wadah TNI.

Edition
-
ISBN/ISSN
9789791056711
Collation
xvii, 437, : ilustrasi ; 23 cm
Series Title
-
Call Number
355.009 598 DAR
Availability1
Add to basket
MARC DownloadCite
cover
Logging and log management: the authoritative guide to understanding the conc…
Comment Share
Phillips, ChristopherChuvakin, AntonSchmidt, Kevin J.Moulder, Patricia

Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…

Edition
--
ISBN/ISSN
9781597496353
Collation
xxx, 431 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHU l
Availability2
Add to basket
MARC DownloadCite
cover
Pengembangan aplikasi yang aman = secure software development lifecycle
Comment Share
Hermawan SetiawanRaden Budiarto HadiprakosoYulandi

Sekarang ini pengembangan perangkat lunak tidak bisa lepas dari aspek keamanannya yang menjadi penekanan pada Secure Software Development Lifecycle (SSDLC). Karena ada ada beberapa penyebab misalnya : mengidentifikasi dan memperbaiki masalah keamanan setelah aplikasi dirilis biasanya lebih mahal dan memakan waktu dibandingkan menangani masalah tersebut selama pengembangan. Bahkan Pelanggaran …

Edition
-
ISBN/ISSN
9786231024800
Collation
iv, 98 hal : 25 cm
Series Title
-
Call Number
005.8 HER.p
Availability3
Add to basket
MARC DownloadCite
cover
Light on yoga
Comment Share
Iyengar, B.K.SLowenthal, Mark M.

Catatan: terdapat indeks.

Edition
null
ISBN/ISSN
4149035
Collation
543 hlm; ilus; 19 cm
Series Title
null
Call Number
181.45 IYE l
Availability0
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
Hardware security and trust: design and deployment of integrated circuits in …
Comment Share
Sklavos, NicolasRegazzoni, FrancescoChaves, RicardoDi Natale, Giorgio

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…

Edition
-
ISBN/ISSN
9783319443188
Collation
254 hlm
Series Title
--
Call Number
005.8 SKL h
Availability2
Add to basket
MARC DownloadCite
cover
Slow living hidup bukanlah pelarian tapi perjalanan: berlatihlah menginjak re…
Comment Share
Sabrina Ara

Penjelasan buku “slow living” menawarkan wawasan tentang gaya hidup yang melambat namun tetap produktif. Ini mengajarkan kita untuk menikmati setiap momen tanpa terlalu sibuk berlari menuju tujuan akhir. Dalam melambat, kita bisa lebih memperhatikan kesehatan mental dan fisik kita, menjaga keseimbangan antara pekerjaan dan kehidupan pribadi. Daftar isi: BAB 1 Zaman yang terobsesi pada …

Edition
Cet. 1
ISBN/ISSN
9786235269283
Collation
viii, 115 hlm.; 20 cm
Series Title
--
Call Number
153.8 SAB s
Availability1
Add to basket
MARC DownloadCite
cover
Advances in Applications of Computational Intelligence and the Internet of Th…
Comment Share
Chowdhury, Rajdeep,Niranjan,

This new volume illustrates the diversified applications of IoT. The volume addresses the issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. Advances in Applications of Computational Intelligence and the Internet of Things (IoT) looks at the application of IoT in medical technology and healthcare, incl…

Edition
-
ISBN/ISSN
9781000286663
Collation
xiii, 162 hal : 23cm
Series Title
--
Call Number
006.3 CHO a
Availability1
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security : Cyber Security and Digital Forensics: Challenges…
Comment Share
Ghonge Mangesh M.,, Mangrulkar Ramchandra, LLe Dac-Nhuong

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a
Availability2
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?