Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 476 from your keywords: subject="Security"
First Page Previous 46 47 48 Next Last Page
cover
Computer security principles and practice
Comment Share
Brown, LawrieLexy J. MoleongStalling, William

Chapter 0 Guide for Readers and Instructors Chapter 1 Overview Chapter 2 Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Chapter 5 Database and Cloud Security Chapter 6 Malicious Software Chapter 7 Denial-of-Service Attacks Chapter 8 Intrusion Detection Chapter 9 Firewalls and Intrusion Prevention …

Edition
third
ISBN/ISSN
9780133773927
Collation
xix, 820 hal.;ilus.;24cm
Series Title
null
Call Number
005.8 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Forozan, Behrouz A.Rush, Michael

Part 1: Symmetric Key Encipherment Chapter 2: Mathematics of Cryptography Chapter 3: Traditional Symmetric Key Ciphers Chapter 4: Mathematics of Cryptography Chapter 5: Introduction to Modern Symmetric-Key Ciphers Chapter 6: Data Encryption Standard (DES) Chapter 7: Advanced Encryption Standard Chapter 8: Encipherment Using Modern Symmetric Key Ciphers Part 2: Asymmetric Key Encipherme…

Edition
first
ISBN/ISSN
9780073327532
Collation
xxvi,721hal .; ilus .; 24cm
Series Title
null
Call Number
005.8 FOR i
Availability1
Add to basket
MARC DownloadCite
cover
Blue team handbook: incident response editions
Comment Share
Gilang PriyadiAgus SriyonoMurdoch, Don

computer security

Edition
first
ISBN/ISSN
9781500734756
Collation
iv,146hal.;ilus.;23cm
Series Title
null
Call Number
005.8 MUR b
Availability1
Add to basket
MARC DownloadCite
cover
The Art of memory forensics
Comment Share
Case, AndrewLevy, JamieLigh, Michael HaleTimWalters, Aaron

Detecting malware adn threats in windows, linux and Mac

Edition
first
ISBN/ISSN
9781118825099
Collation
xxiii,886hal.;ilus.;23,5cm
Series Title
null
Call Number
005.8 LIG a
Availability1
Add to basket
MARC DownloadCite
cover
The puzzle palace
Comment Share
Bamford, JamesBloch, Jonathan

Anak judul: a report on America's most secret agency

Edition
null
ISBN/ISSN
140067485
Collation
655 hlm.; 20 cm.
Series Title
null
Call Number
327.1273 BAM p
Availability2
Add to basket
MARC DownloadCite
cover
The shadow factory
Comment Share
Abdillah HalimBamford, JamesKinanti AtmarindyMuhibbin SyahSoemardjoWilcox, LynnAndi Mappiare

Anak judul: the ultra-secret NSA from 9/11 to the eavesdroppping on America. Termasuk bibliografi dan indeks.

Edition
null
ISBN/ISSN
9780307279392
Collation
ix, 395 hlm.; 20 cm.
Series Title
null
Call Number
327.1273 BAM s
Availability1
Add to basket
MARC DownloadCite
cover
Body of secret
Comment Share
Bamford, JamesPearce, John A.

Anak judul: anatomy of the ultra-secret National Security Agency. Termasuk bibliografi dan indeks.

Edition
null
ISBN/ISSN
385499078
Collation
721 hlm.; 24 cm.
Series Title
null
Call Number
327.1273 BAM b
Availability2
Add to basket
MARC DownloadCite
cover
Secure integrated circuits and systems
Comment Share
Verbauwhede, Ingrid M.R.

Terdapat bibliografi dan indeks. CONTENTS: 1. Introduction to Side-Channel Attacks (Standaert, Fran

Edition
null
ISBN/ISSN
9780387718279
Collation
x, 246 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
621.3815 VER s
Availability1
Add to basket
MARC DownloadCite
cover
Paket informasi teknologi
Comment Share
Suci Wulandari

Anak Judul: Secure communication device (kumpulan artikel) DAFTAR ISI:
1. Pendahuluan
2. Hasil Penelususran
< >Secure communication: quantum cryptography with a photon turnstile
< >Commmunication security system
< >Assessing security of information technology
< >System and method for synchronizing one time pad encryption keys for secure communicati…

Edition
null
ISBN/ISSN
null
Collation
ii, 174 hlm.; 29 cm.
Series Title
null
Call Number
005.8 SUC p
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cryptography
Comment Share
Delfs, HansKnebl, HelmutMaurer, Ueli

Anak judul: principles and applications. Termasuk bibliografi dan indeks. Guide to elliptic curve cryptography / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes. Computer security. Public key cryptography. ContentsList of Algorithms List of Tables List of Figures Acronyms CONTENTS: 1. Introduction
< >1.1 Encryption and Secrecy
< >1.2 The Objectives of Cryptograph…

Edition
Second Edition
ISBN/ISSN
9783540492436
Collation
xvi, 367 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 DEL i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 46 47 48 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?