Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 607 from your keywords: subject="Komputer"
First Page Previous 46 47 48 49 50 Next Last Page
cover
TCP/IP illustrated: the protocols Volume 1
Comment Share
Fall, Kevin R.Stevens, W. Richard

Contents Preface Chapter 1. Introduction Chapter 2. Link Layer Chapter 3. IP: Internet Protocol Chapter 4. ARP: Address Resolution Protocol Chapter 5. RARP: Reverse Address Resolution Protocol Chapter 6. ICMP: Internet Control Message Protocol Chapter 7. Ping Program Chapter 8. Traceroute Program Chapter 9. IP Routing Chapter 10. Dynamic Routing Protocols Chapter 11. UDP: User Datag…

Edition
Second Edition
ISBN/ISSN
9780321336316
Collation
xxxv, 1016 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.7 FAL t
Availability1
Add to basket
MARC DownloadCite
cover
Cracking the coding interview: 189 programming questions & solutions
Comment Share
McDowell, Gayle Laakmann

Table of contents: 1. The Interview Process 2. Behind the Scenes 3. Special Situations 4. Before the Interview 5. Behavioral Preparation 6. Big O 7. Technical Questions (+ 5 Algorithm Approaches) 8. The Offer and Beyond 9. 189 Programming Questions and Answers

Edition
6th edition
ISBN/ISSN
9780984782857
Collation
x, 678 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.1 MCD c
Availability1
Add to basket
MARC DownloadCite
cover
Head First JAVA
Comment Share
Loukides MikeSierra KathyBates Bert

Table of Contents: Chapter 1 Dive in A Quick Dip: Breaking the Surface Chapter 2 Classes and Objects: A Trip to Objectville Chapter 3 Primitives and References: Know Your Variables Chapter 4 Methods Use Instance Variables: How Objects Behave Chapter 5 Writing a Program: Extra-Strength Methods Chapter 6 Get to Know the Java API: Using the Java Library Chapter 7 Inheritance and Polymo…

Edition
2nd Edition
ISBN/ISSN
9780596009205
Collation
xxxii, 674 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.262 SIE h
Availability1
Add to basket
MARC DownloadCite
cover
CompTia network + guide to network
Comment Share
Andrews, JeanWest, JillDean, Tamara

Table of contents: 1. Introduction to Networking. 2. How Computers Find Each Other on Networks. 3. How Data Gets Transported Over Networks. 4. Structured Cabling and Network Elements. 5. Network Cabling. 6. Wireless Networking. 7. Remote Access and Cloud Computing. 8. Network Risk Management. 9. Unified Communications and Network Performance Management. 10. Network Segmentation and Vi…

Edition
Seventh Edition
ISBN/ISSN
9781305090941
Collation
xxvii, 782 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.65 WES c
Availability1
Add to basket
MARC DownloadCite
cover
Computer networking: a top-down approach
Comment Share
Kurose, James F.Ross, Keith W.

Contents: 1. Computer Networks and the Internet 2. Application Layer 3. Transport Layer 4. The Network Layer: Data Plane 5. The Network Layer: Control Plane 6. The Link Layer: Links, Access Networks, and LANs 7. Wireless and Mobile Networks 8. Security in Computer Networks 9. Multimedia Networking

Edition
Seventh Edition
ISBN/ISSN
9780133594140
Collation
iv, 823 hal.; ilus.; 24cm
Series Title
--
Call Number
004.65 KUR c
Availability1
Add to basket
MARC DownloadCite
cover
Homomorphic encryption and applications
Comment Share
Paulet, RussellBertino, ElisaXun Yi

1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…

Edition
--
ISBN/ISSN
9783319122281
Collation
xii, 126 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 XUN h
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to algorithms
Comment Share
Cormen, Thomas H.Leiserson, Charles E.Ronald, Rivest L.Clifford, Stein

Table of contents: I. Foundations 1. The Role of Algorithms in Computing 2. Getting Started 3. Growth of Functions 4. Divide-and-Conquer 5. Probabilistic Analysis and Randomized Algorithms II. Sorting and Order Statistics 6. Heapsort 7. Quicksort 8. Sorting in Linear Time 9. Medians and Order Statistics III. Data Structures 10. Elementary Data Structures 11. Hash Tables 12. B…

Edition
Third Edition
ISBN/ISSN
9780262033848
Collation
xi, 1292 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.1 COR i
Availability1
Add to basket
MARC DownloadCite
cover
Limits of computation: from a programming perspective
Comment Share
Reus, Bernhard

Contents: 1. Limits? What Limits? 2. Problems and Effective Procedures 3. The WHILE-Language 4. Semantics of WHILE 5. Extensions of WHILE 6. Programs as Data Objects 7. A Self-interpreter for WHILE 8. An Undecidable (Non-computable) Problem 9. More Undecidable Problems 10. Self-referencing Programs 11. The Church-Turing Thesis 12. Measuring Time Usage 13. Complexity Classes 14.…

Edition
--
ISBN/ISSN
9783319278872
Collation
xvii, 348 hal.; ilus.; 24 cm.
Series Title
--
Call Number
005.1 REU l
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to the theory of computation
Comment Share
Sipser, Michael

PART 1: AUTOMATA AND LANGUAGES. 1. Regular Languages. 2. Context-Free Languages. PART 2: COMPUTABILITY THEORY. 3. The Church-Turing Thesis. 4. Decidability. 5. Reducibility. 6. Advanced Topics in Computability Theory. PART 3: COMPLEXITY THEORY. 7. Time Complexity. 8. Space Complexity. 9. Intractability. 10. Advanced Topics in Complexity Theory.

Edition
3rd Edition ( International Edition )
ISBN/ISSN
9781133187813
Collation
xxii, 457 hal.; ilus.; 24cm.
Series Title
--
Call Number
004.0151 SIP i
Availability1
Add to basket
MARC DownloadCite
cover
Algebra for applications: cryptography, secret sharing, error-correcting, fin…
Comment Share
Slinko, Arkadii

CONTENTS: 1.Integers 1.1.Natural Numbers 1.2.The Euclidean Algorithm 1.3.Fermat's Little Theorem and Its Generalisations 1.4.The Ring of Integers Modulo n. The Field Zp 1.5.Representation of Numbers 2.Cryptology 2.1.Classical Secret-Key Cryptology 2.2.Modern Public-Key Cryptology 2.3.Computational Complexity 2.4.The RSA Public-Key Cryptosystem 2.5.Applications of Cryptology 3…

Edition
--
ISBN/ISSN
9783319219509
Collation
xiv, 328.; ilus.; 24 cm
Series Title
Spinger undergraduate mathematics series
Call Number
004.0151 SLI a
Availability1
Add to basket
MARC DownloadCite
First Page Previous 46 47 48 49 50 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?