Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 476 from your keywords: subject="Security"
First Page Previous 46 47 48 Next Last Page
cover
Guide to elliptic curve cryptography
Comment Share
Hankerson, DarrelMenezes, AlfredVanstone, Scott

Termasuk bibliografi dan indeks. CONTENTS:
1 Introduction and Overview
< >1.1 Cryptography basics
< >1.2 Public-key cryptography
< >< >1.2.1 RSAsystems
< >< >1.2.2 Discrete logarithmsystems
< >< >1.2.3 Elliptic curve systems
< >1.3 Why elliptic curve cryptography?
< >1.4 Roadmap
< >1.5 Notes and fur…

Edition
null
ISBN/ISSN
9781441929297
Collation
xx, 311 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 HAN g
Availability1
Add to basket
MARC DownloadCite
cover
Information security
Comment Share
Stamp, Mark

Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…

Edition
null
ISBN/ISSN
9780471738480
Collation
xxi, 390 hlm.; ilus.; 25 cm.
Series Title
null
Call Number
005.8 STA i
Availability5
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability6
Add to basket
MARC DownloadCite
cover
Cryptography of number theoretic ciphers
Comment Share
Atallah, Mike J.Wagstaff, Samuel S.

Termasuk bibliografi dan indeks. CONTENTS:
Terminology of Cryptography
< >Notation
< >Types of Attacks
< >Public Key Ciphers
< >Block and Stream Ciphers
< >Protocols

Probability Theory
< >Definitions
< >The Birthday Problem
< >Random Variables

Divisibility and Arithmetic
< >Divisibility<…

Edition
null
ISBN/ISSN
1584881534
Collation
xv, 318 hlm.; ilus.; 24 cm.
Series Title
Computational mathematics series
Call Number
005.8 WAG c
Availability0
Add to basket
MARC DownloadCite
cover
Practical malware analysis
Comment Share
Honig, AndrewSikorski, Michael

Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer
Basic Static Techniques
< >Antivirus Scanning: A Useful First Step
< >Hashing: A Fingerprint for Malware
< >Finding Strings
< >Packed and Obfuscated Malware
< >Portable Executable File Format
< >Linked Libraries and Functions
< >Static Ana…

Edition
null
ISBN/ISSN
9781593272906
Collation
xxxi, 766 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.84 SIK p
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Buku pintar teknik hacking
Comment Share
Dedik KurniawanJava Cretivity

Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip Password Asterisk Suatu …

Edition
null
ISBN/ISSN
9786020219370
Collation
xi, 264 hlm.; ilus.; 21 cm. + 1 DVD
Series Title
null
Call Number
005.84 DED b
Availability1
Add to basket
MARC DownloadCite
cover
Trik bobol jaringan wireless
Comment Share
Munadzir MF

Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filter 7.4 Bypass MA…

Edition
null
ISBN/ISSN
9786022881575
Collation
212 hlm.; ilus.; 21 cm.
Series Title
null
Call Number
005.84 MUN t
Availability0
Add to basket
MARC DownloadCite
cover
Kriptografi keamanan internet dan jaringan komunikasi
Comment Share
Yusuf Kurniawan

DAFTAR ISI:
1. Pendahuluan
< >Komunikasi
< >Aspek-aspek keamanan
< >Algoritma dan kunci
< >Cryptanalysis
< >Macam-macam algoritma kriptografi
< >Macam-macam serangan cryptanalyst
< >Keamanan algoritma
2. Algoritma kriptografi klasik
< >Teknik subtitusi
< >< >Subtitusi deret campuran kata kunci
<&…

Edition
null
ISBN/ISSN
9793338164
Collation
x, 316 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 YUS k
Availability1
Add to basket
MARC DownloadCite
cover
Iron-clad java
Comment Share
Detlefsen, AugustManico, JimMcKenzie, Jody

Anak Judul: best practices for secure java web application development. Terdapat bibliografi dan indeks. CONTENTS:
1. Web Application Security Basics
< >What Is Untrusted Data?
< >HTTP Security Considerations
< >< >HTTPS
< >< >HTTP/S GET Request
< >< >HTTP/S POST Request
< >< >HTTP/S Response
< ><&…

Edition
null
ISBN/ISSN
9780071835886
Collation
xvii, 282 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.262 MAN i
Availability0
Add to basket
MARC DownloadCite
First Page Previous 46 47 48 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?