Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 48 from your keywords: subject="Java (Computer Progra...
First Page Previous 1 2 3 4 5
cover
Head First JAVA
Comment Share
Loukides MikeSierra KathyBates Bert

Table of Contents: Chapter 1 Dive in A Quick Dip: Breaking the Surface Chapter 2 Classes and Objects: A Trip to Objectville Chapter 3 Primitives and References: Know Your Variables Chapter 4 Methods Use Instance Variables: How Objects Behave Chapter 5 Writing a Program: Extra-Strength Methods Chapter 6 Get to Know the Java API: Using the Java Library Chapter 7 Inheritance and Polymo…

Edition
2nd Edition
ISBN/ISSN
9780596009205
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.262 SIE h
Availability1
Add to basket
MARC DownloadCite
cover
Algoritma & pemrograman menggunakan Java
Comment Share
Abdul, Kadir

Daftar isi: Bab 1 Pengantar algoritma dan pemrograman Bab 2 Struktur dasar algoritma Bab 3 Pedoman penyusunan algoritma Bab 4 Dasar bahasa java Bab 5 Operasi seleksi Bab 6 Operasi pengulangan Bab 7 Larik Bab 8 Subrutin Bab 9 Rekursi Bab 10 Pencarian data Bab 11 Pengurutan data

Edition
-
ISBN/ISSN
9789792927511
Collation
xii, 288 hlm.; 23 cm.
Series Title
-
Call Number
005.262 ABD a
Availability1
Add to basket
MARC DownloadCite
cover
Semua bisa menjadi programmer Web Java: case study
Comment Share
Yuniar, Supardi

> Mengenal Java dan JDBC > Cara Instalasi Software yang Digunakan > Variable Standard > Program Perhitungan > Program Database Input Data > Menu Pull Down > Program Layout Homepage > Insert Image > CRUD Database JSP > Study Kasus Web Sistem_Informasi_Nilai

Edition
-
ISBN/ISSN
9786020277356
Collation
ix, 161 hlm.; 21 cm.
Series Title
-
Call Number
005.262 YUN s
Availability1
Add to basket
MARC DownloadCite
cover
Beginning cryptography with Java
Comment Share
Hook, David

Brief Contents Chapter 1: The JCA and the JCE Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chapter 9: CMS and S/MIME Chapter 10: S…

Edition
-
ISBN/ISSN
764596330
Collation
xxxii, 448 hlm.; 24 cm.
Series Title
-
Call Number
005.8 HOO b
Availability0
Add to basket
MARC DownloadCite
cover
Introduction to cryptography with Java applets
Comment Share
Bishop, David

Contents: Chapter 1: A History of Cryptography 1 Chapter 2: Large Integer Computing 33 Chapter 3: The Integers 65 Chapter 4: Linear Diophantine Equations and Linear Congruences 89 Chapter 5: Linear Ciphers 105 Chapter 6: Systems of Linear Congruences—Single Modulus 125 Chapter 7: Matrix Ciphers 143 Chapter 8: Systems of Linear Congruences—Multiple Moduli 161 Chapter 9: Quadrati…

Edition
-
ISBN/ISSN
763722073
Collation
xvi, 370 hlm.; 24 cm.
Series Title
-
Call Number
005.8 BIS i
Availability1
Add to basket
MARC DownloadCite
cover
Beginning cryptography with Java
Comment Share
Hook, David

Contents: Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chap…

Edition
-
ISBN/ISSN
9788126506262
Collation
xxiv, 448 hlm.; 24 cm.
Series Title
-
Call Number
005.8 HOO b
Availability1
Add to basket
MARC DownloadCite
cover
Iron-clad java
Comment Share
Detlefsen, AugustManico, JimMcKenzie, JodyWeiner, Tim

Anak Judul: best practices for secure java web application development. Terdapat bibliografi dan indeks. CONTENTS:
1. Web Application Security Basics
What Is Untrusted Data?
HTTP Security Considerations
HTTPS
HTTP/S GET Request
HTTP/S POST Request
HTTP/S Response
HTTP/S Response Headers
Anti-Patterns and Weaknesses
…

Edition
null
ISBN/ISSN
9780071835886
Collation
xvii, 282 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.262 MAN i
Availability1
Add to basket
MARC DownloadCite
cover
Iron-clad java
Comment Share
Detlefsen, AugustManico, JimMcKenzie, Jody

Anak Judul: best practices for secure java web application development. Terdapat bibliografi dan indeks. CONTENTS:
1. Web Application Security Basics
< >What Is Untrusted Data?
< >HTTP Security Considerations
< >< >HTTPS
< >< >HTTP/S GET Request
< >< >HTTP/S POST Request
< >< >HTTP/S Response
< ><&…

Edition
null
ISBN/ISSN
9780071835886
Collation
xvii, 282 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.262 MAN i
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?