Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 41 42 43 44 45 Next Last Page
cover
Access control, authentication, and public key infrastructure
Comment Share
Chapple, MikeBallad, BillBallad, TriciaBanks, Erin K.

Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…

Edition
Second Edition
ISBN/ISSN
9781284031591
Collation
xvii, 391 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 CHA a
Availability1
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
Digital signal processing: using the ARM cortex-M4
Comment Share
Reay, Donald S.

Contents: 1 ARM cortex-4M development systems 1.1 Introduction 2 Analog input and output 2.1 Introduction 2.2 TLV320AIC3104 (AIC3104)stereo codec for audio input and output 2.3 WM5102 audio hub codec for audio input and output 2.4 Programming examples 2.5 Real-time input output using polling, interrupts, and direct memory access (DMA) 2.6 Real-time waveform generation 2.7 Identif…

Edition
--
ISBN/ISSN
9781118859049
Collation
xii, 302 hal.; ilus.; 24 cm
Series Title
--
Call Number
621.382 REA d
Availability2
Add to basket
MARC DownloadCite
cover
Theory and computation of electromagnetic fields
Comment Share
Jin, Jian-Ming

Table of contents: PART I Electromagnetic Field Theory 1 1 Basic Electromagnetic Theory 3 1.1 Review of Vector Analysis, 3 1.2 Maxwell’s Equations in Terms of Total Charges and Currents, 11 1.3 Constitutive Relations, 18 1.4 Maxwell’s Equations in Terms of Free Charges and Currents, 25 1.5 Boundary Conditions, 27 1.6 Energy, Power, and Poynting’s Theorem, 31 1.7 Time-Harmonic Fie…

Edition
Second Edition
ISBN/ISSN
9781119108047
Collation
xxii, 715 hal.; ilus.; 26 cm
Series Title
--
Call Number
530.141 JIN t
Availability1
Add to basket
MARC DownloadCite
cover
Electronic devices and circuit theory
Comment Share
Nashelsky, LouisBoylestad, Robert L.

Table of contents: ch. 1 Semiconductor Diodes ch. 2 Diode Applications ch. 3 Bipolar Junction Transistors ch. 4 DC Biasing-BJTs ch. 5 BJT AC Analysis ch. 6 Field-Effect Transistors ch. 7 FET Biasing ch. 8 FET Amplifiers ch. 9 BJT and JFET Frequency Response ch. 10 Operational Amplifiers ch. 11 Op-Amp Applications ch. 12 Power Amplifiers ch. 13 Linear-Digital ICs ch. 14 Feedback an…

Edition
Eleventh Edition
ISBN/ISSN
9780132622264
Collation
xvii, 906 hal.; ilus.; 28 cm
Series Title
--
Call Number
621.381 BOY e
Availability2
Add to basket
MARC DownloadCite
cover
Cyber security basics: protect your organization by applying the fundamentals
Comment Share
Franke, Don

Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …

Edition
--
ISBN/ISSN
9781522952190
Collation
98 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 FRA c
Availability1
Add to basket
MARC DownloadCite
cover
Programming the Raspberry Pi: getting started with Python
Comment Share
Monk, Simon

Table of contents: A. About the Author B. Dedication C. Acknowledgments D. Introduction 1. Introduction What Is the Raspberry Pi? What Can You Do with a Raspberry Pi? A Tour of the Raspberry Pi Setting Up Your Raspberry Pi Booting Up Summary 2. Getting Started Linux The Desktop The Int…

Edition
Second Edition
ISBN/ISSN
9781259587405
Collation
xix, 188 hal.; ilus.; 23 cm
Series Title
--
Call Number
629.8 MON p
Availability1
Add to basket
MARC DownloadCite
cover
Advance in information systems set (volume 2): information and knowledge system
Comment Share
Arduin, Pierre-EmmanuelGrundstein, MichelRosenthal-Sabroux, Camille

Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …

Edition
--
ISBN/ISSN
9781848217522
Collation
xiii, 82 hal.; ilus.; 24 cm
Series Title
Information systems, web and pervasive computing series
Call Number
004 ARD a
Availability1
Add to basket
MARC DownloadCite
cover
Research design: qualitative, quantitative & mixed methods approaches
Comment Share
Creswell, John W.Creswell, J. David

Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…

Edition
5th Edition
ISBN/ISSN
9781506386768
Collation
xxv, 275 hal.; ilus.; 25 cm
Series Title
--
Call Number
300.72 CRE r2
Availability5
Add to basket
MARC DownloadCite
cover
Linux essentials
Comment Share
Bresnahan, ChristineBlum, Richard

Contents: Chapter 1 Selecting an Operating System 1 What Is an OS? 1 Investigating User Interfaces 4 Where Does Linux Fit in the OS World? 8 What Is a Distribution? 13 Chapter 2 Understanding Software Licensing 21 Investigating Software Licenses 21 Looking at the Free Software Foundation 24 Looking at the Open Source Initiative 26 Looking at the Creative Commo…

Edition
Second edition
ISBN/ISSN
9781119092063
Collation
xvii, 342 hal.; illus.; 24 cm
Series Title
--
Call Number
005.43 BRE l
Availability1
Add to basket
MARC DownloadCite
First Page Previous 41 42 43 44 45 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?