Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 476 from your keywords: subject="Security"
First Page Previous 41 42 43 44 45 Next Last Page
cover
Top secret America: the rise of the new american security state
Comment Share
Arkin, William M.Priest, Dana

The top-secret world that the government created in response to the 9/11 terrorist attacks has become so enormous, so unwieldy, and so secretive that no one knows how much money it costs, how many people it employs or exactly how many agencies duplicate work being done elsewhere. The result is that the system put in place to keep the United States safe may be putting us in greater danger. In TO…

Edition
First Edition
ISBN/ISSN
9780316182218
Collation
xxiv, 296 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
363.3273 PRI t
Availability1
Add to basket
MARC DownloadCite
cover
Handbook of electronic security and digital forensics
Comment Share
Jahankhani, HamidLeonhardt, FrankMe, GianluigiWatson, David Lilburn

CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …

Edition
-
ISBN/ISSN
9789812837035
Collation
ix, 297 hlm.: ilus.; 24 cm.
Series Title
-
Call Number
658.478 JAH h
Availability1
Add to basket
MARC DownloadCite
cover
Computation, cryptography, and network security
Comment Share
Daras, Nicholas J.Rassias, Michael Th.

CONTENTS: 1. Machine generated contents note: Transformations of Cryptographic Schemes Through Interpolation Techniques / Michael N. Vrahatis 2. Flaws in the Initialisation Process of Stream Ciphers / Kenneth Koon-Ho Wong 3. Producing Fuzzy Inclusion and Entropy Measures / Basil K. Papadopoulos 4. On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle …

Edition
-
ISBN/ISSN
9783319182742
Collation
ix, 756 hlm.: ilus.; 25 cm
Series Title
-
Call Number
005.8 DAR c
Availability1
Add to basket
MARC DownloadCite
cover
The Hash function BLAKE
Comment Share
Aumasson, Jean-PhilippeHenzen, LucaMeier, WiliPhan, Raphael C.-W.

CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…

Edition
-
ISBN/ISSN
9783662447567
Collation
Berlin
Series Title
Information Security and Crypography
Call Number
005.8 AUM h
Availability1
Add to basket
MARC DownloadCite
cover
Secure integrated circuits and systems
Comment Share
Verbauwhede, Ingrid M.R.Verhofstad, ing J.P.

Terdapat bibliografi dan indeks. CONTENTS: 1. Introduction to Side-Channel Attacks (Standaert, Fran

Edition
null
ISBN/ISSN
9780387718279
Collation
x, 246 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
621.3815 VER s
Availability1
Add to basket
MARC DownloadCite
cover
Paket informasi teknologi
Comment Share
Bijah SubijantoSuci Wulandari

Anak Judul: Secure communication device (kumpulan artikel) DAFTAR ISI:
1. Pendahuluan
2. Hasil Penelususran
< >Secure communication: quantum cryptography with a photon turnstile
< >Commmunication security system
< >Assessing security of information technology
< >System and method for synchronizing one time pad encryption keys for secure communicati…

Edition
null
ISBN/ISSN
null
Collation
ii, 174 hlm.; 29 cm.
Series Title
null
Call Number
005.8 SUC p
Availability1
Add to basket
MARC DownloadCite
cover
Information security
Comment Share
Gerhart, BarryStamp, MarkWright, Patrick M.

Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…

Edition
null
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.8 STA i
Availability5
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability1
Add to basket
MARC DownloadCite
cover
Social engineering - the art of human hacking
Comment Share
Christopher Hadnagy

A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.

Edition
null
ISBN/ISSN
9780470639535
Collation
--
Series Title
--
Call Number
005.8 HAD s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 41 42 43 44 45 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?