Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 272 from your keywords: subject="Computer security"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
cover
Data security in cloud storage (wireless networks)
Comment Share
Zhang, YuanXu, ChunxiangShen, Xuemin Sherman

Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D

Edition
-
ISBN/ISSN
9789811543739
Collation
xii, 171 hlm.; ilus.; 24 cm
Series Title
-
Call Number
004.6782 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
Ghost in the wires: my adventures as the world's most wanted hacker
Comment Share
Mitnick, KevinSimon, William L.

Table of Contents Prologue xv Part 1 The Making of a Hacker 1 Rough Start 3 2 Just Visiting 7 3 Original Sin 20 4 Escape Artist 34 5 All Your Phone Lines Belong to Me 44 6 Will Hack for Love 53 7 Hitched in Haste 62 8 Lex Luthor 72 9 The Kevin Mitnick Discount Plan 94 10 Mystery Hacker 102 Part 2 Eric 11 Foul Play 111 12 You Can Never Hide 116 13 The Wiretapper 126 14 You…

Edition
-
ISBN/ISSN
9780316037723
Collation
xii, 412 hlm.; ilus.; 21 cm
Series Title
-
Call Number
005.84 MIT g
Availability1
Add to basket
MARC DownloadCite
cover
Encryption for organizations and individuals: basics of contemporary and quan…
Comment Share
Ciesla, Robert

Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their va…

Edition
-
ISBN/ISSN
9781484260555
Collation
xxi, 286 hlm; ilus; 23,5 cm
Series Title
-
Call Number
005.82 CIE e
Availability2
Add to basket
MARC DownloadCite
cover
Security, privacy and user interaction
Comment Share
Jakobsson, Markus

Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…

Edition
-
ISBN/ISSN
9783030437534
Collation
xv, 153 hlm.; ilus.; 23 cm
Series Title
-
Call Number
005.8 JAK s
Availability1
Add to basket
MARC DownloadCite
cover
Manipulated: inside the cyberwar to hijack elections and distort the truth
Comment Share
Payton, Theresa

Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…

Edition
-
ISBN/ISSN
9781538133507
Collation
xi, 193 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 PAY m
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity in humanities and social sciences: a research methods approach
Comment Share
Loiseau, HugoVentre, DanielAden, Hartmut

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…

Edition
-
ISBN/ISSN
9781786305398
Collation
xiv, 209 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8072 LOI c
Availability1
Add to basket
MARC DownloadCite
cover
Tribe of hackers security leaders
Comment Share
Carey, Marcus J.Jin, Jennifer

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…

Edition
-
ISBN/ISSN
9781119643777
Collation
x, 300 hlm; 22 cm
Series Title
-
Call Number
005.1092 CAR t
Availability2
Add to basket
MARC DownloadCite
cover
Resilience of cyber-physical systems: from risk modelling to threat counterac…
Comment Share
Flammini, Francesco

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs' exposu…

Edition
-
ISBN/ISSN
9783319955964
Collation
xvi, 229 hlm.; ilus.; 23,5 cm
Series Title
-
Call Number
005.8 FLA r
Availability1
Add to basket
MARC DownloadCite
cover
Handbook of big data privacy
Comment Share
Choo, Kim-Kwang RaymondDehghantanha, Ali

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to o…

Edition
-
ISBN/ISSN
9783030385569
Collation
ix, 397 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.74 CHO h
Availability1
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?