Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 41 42 43 44 45 Next Last Page
cover
Medical information systems ethics
Comment Share
Beranger, Jerome

Contents: Chapter 1 The emergence medical information in the face of personal and sociental ethical challenges 1.1 An information-consuming society 1.2 E-health, m-health, the quantified self and big data 1.3 Medical secrecy in the face of the computerization of healthcare data 1.4 Cultural evolution of mentalities surrounding legitimacy of information 1.5 Processing of personal data in…

Edition
--
ISBN/ISSN
9781848218598
Collation
xxxi, 268 hal.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
610.285 BER m
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity to English dictionary
Comment Share
Meeuwisse, Raef

Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…

Edition
Third edition
ISBN/ISSN
9781911452102
Collation
xii, 106 hal.; 20 cm
Series Title
--
Call Number
R005.803 MEE c
Availability1
Add to basket
MARC DownloadCite
cover
Satellite and terrestrial hybrid networks
Comment Share
Berthou, PascalBaudoin, CedricGayraud, ThierryGineste, Matthieu

Contents: Chapter 1 Satellite and terrestrial hybrid networks 1.1 Designing satellite and terrestrial hybrid networks 1.2 Hybrid scenarios 1.3 Case study: loose coupling integration 1.4 Conclusion Chapter 2 Quality of service on next- generation terrestrial networks 2.1 IETF approach 2.2 ITU-NGN approach 2.3 Conclusion Chapter 3 Quality of service in DVB-S/RCS satellite networks…

Edition
--
ISBN/ISSN
9781848215412
Collation
xxi, 242 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.382 BER s
Availability1
Add to basket
MARC DownloadCite
cover
CISA: certified information systems auditor study guide
Comment Share
Cannon, David LO'Hara, Brian T.Keele, Allen

Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …

Edition
Fourth edition
ISBN/ISSN
9781119056249
Collation
lxiv, 632 hal.; ilus.; 24 cm
Series Title
--
Call Number
658.4038 CAN c
Availability1
Add to basket
MARC DownloadCite
cover
CompTIA linux+/LPIC-1 certification all-in-on exam guide
Comment Share
Tracy, Robb H.

Contents at a glance: Chapter 1 An introduction to linux Chapter 2 Working with the linux shell Chapter 3 Using the vi text editor Chapter 4 Managing linux files and directories Chapter 5 Installing ninux Chapter 6 Managing the linux boot process Chapter 7 Managing the graphical environment Chapter 8 Managing linux software Chapter 9 Managing linux users and groups Chapter …

Edition
Second edition
ISBN/ISSN
9781259863691
Collation
liii, 810 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.446 TRA c
Availability1
Add to basket
MARC DownloadCite
cover
New directions of modern cryptography
Comment Share
Cao, Zhenfu

Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…

Edition
--
ISBN/ISSN
9781466501386
Collation
xv, 384 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CAO n
Availability1
Add to basket
MARC DownloadCite
cover
Fundamentals of big data network analysis for research and industry
Comment Share
Lee, HyunjoungSohn, II

Contents: 1 Why big data 1.1 Big data 1.2 What creates big data 1.3 How do we use big data 1.4 Essential issues related to big data References 2 Basic programs for analyzing network 2.1 UCINET 2.2 NetMiner 2.3 R 2.4 Gephi 2.5 NodeXL References 3 Understanding network analysis 3.1 Defining social network analysis 3.2 Basic SNA concepts 3.3 Social network data References …

Edition
--
ISBN/ISSN
9781119015581
Collation
xvi, 196 hal.; ilus.; 24 cm
Series Title
--
Call Number
006.312 LEE f
Availability1
Add to basket
MARC DownloadCite
cover
Dark territory: the secret history of cyber war
Comment Share
Kaplan, Fred

Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…

Edition
--
ISBN/ISSN
9781476763255
Collation
vii, 344 hal.; 21 cm
Series Title
--
Call Number
363.3 KAP d
Availability1
Add to basket
MARC DownloadCite
cover
Digital watermarking and steganography: fundamentals and techniques
Comment Share
Shih, Frank Y.

Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …

Edition
Second Edition
ISBN/ISSN
9781498738767
Collation
xxii, 270 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 SHI d
Availability0
Add to basket
MARC DownloadCite
cover
SSFIPS securing cisco networks with sourcefire intrusion prevention system st…
Comment Share
Lammle, ToddGay, JohnTatistcheff, Alex

Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…

Edition
--
ISBN/ISSN
9781119155034
Collation
xxix, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 LAM s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 41 42 43 44 45 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?