Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 51 52 53 54 55 Next Last Page
cover
Konsep dasar rekayasa perangkat lunak (Software reengineering)
Comment Share
Soetam Rizky

Daftar isi: Pendahuluan Pengenal Rekayasa Perangkat Lunak Mengapa harus belajar RPL Definisi Lingkup RPL Setelah Paham RPL,Lalu Apa Ringkasan Pertanyaan Pengembangan Hingga sejauh ini Siklus Hidup Dan Proses Perangkat Lunak Antara Proses dan Siklus Hidup Siklus hidup Proses prangkat lunak Ringkasan Pertanyaan pengembangan Hingga sejauh ini Perencanaan Perangkat Lunak Peren…

Edition
Cetakan pertama
ISBN/ISSN
9786028963176
Collation
viii, 292 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.36 SOE k
Availability3
Add to basket
MARC DownloadCite
cover
Electromagnetics for engineers
Comment Share
Ulaby, Fawwaz T.

Terdapat bibliografi dan indeks.

CONTENTS:
1. Introduction
1.1 Historical timeline
1.2 Dimensions, units, and notation
1.3 The nature of EM
1.4 The electromagnetic spectrum

2. Vector Analysis
2.1 Basic laws of vectors
2.2 Orthogonal coordinate systems
2.3 Transformation between coordinate systems
2.4 Gradient of sca…

Edition
International edition
ISBN/ISSN
9780131970649
Collation
xii, 383 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
621.34 ULA e
Availability1
Add to basket
MARC DownloadCite
cover
Computational intelligence in information assurance and security
Comment Share
Nedjah, NadiaAbraham, AjithMourelle, Luiza de Macedo

Contents 1. Cryptography and Cryptanalysis Through Computational Intelligence 1.1. Introduction 1.1.1. Block ciphers 1.1.2. Public key cryptographic schemes 1.1.3. Elliptic Curve based cryptosystems 1.2. Computational Intelligence Background and Methods 1.2.1. Evolutionary Computation 1.2.2. Artificial Neural Networks 1.2.3. Fuzzy systems 1.3. Review of Cryptography and Cry…

Edition
--
ISBN/ISSN
9783540710776
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
Studies in computational intelligence
Call Number
005.8 NED c
Availability1
Add to basket
MARC DownloadCite
cover
Pengamanan sistem komputer
Comment Share
Janner Simarmata

Daftar Isi: 1. Pengantar Keamanan Komputer 2. Virus Komputer 3. Memahami Spyware 4. Keamanan dalam e-business 5. Keamanan Terhadap Jaringan 6. Hacking dan Cracking 7. Kriptografi

Edition
Ed. I
ISBN/ISSN
9789797631222
Collation
xviii, 252 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 JAN p
Availability2
Add to basket
MARC DownloadCite
cover
Pengembangan aplikasi database berbasis javaDB dengan Netbeans
Comment Share
Arie Prabawati

DAFTAR ISI SESI 1 PENDAHULUAN NETBEANS IDE 6.5 JAVADB MENGENAL AREA KERJA NETBEANS 6.5 RANGKUMAN KUIS SESI 2 BAHASA SQL JAVADB ATURAN PENULISAN STRING SQL DAN KARAKTER KHUSUS IDENTIFIER SQL KEYWORD SQL JAVADB TIPE DATA SQL JAVADB STATEMENT SQL JAVADB DATA DEFINITION LANGUAGE (DDL) DATA MANIPULATION LANGUAGE (DML) DATA CONTROL LANGUAGE (DCL) KLAUSA SQL OPERASI JOIN FUNGSI …

Edition
Ed. I
ISBN/ISSN
9789792913569
Collation
xii, 302 hlm.; ilus.; 23 cm
Series Title
Shortcourse Series
Call Number
005.262 ARI p
Availability1
Add to basket
MARC DownloadCite
cover
Bongkar Rahasia E-Banking Security dengan Tehnik Hacking dan Carding
Comment Share
Vyctoria

Daftar isi: BAB 1 TEKNOLIGI PERBANKAN ATM Phone Banking SMS/M-Banking Internet Banking BAB 2 MENGENAL ATM Komponen ATM Software ATM Fasilitas Keamanan pada Software ATM Cara Kerja ATM Jenis-jenis ATM Produsen ATM BAB 3 KARTU ATM & KARTU KREDIT Anatomi Kartu ATM & Kartu Kredit Magnetic Stripe Nomor Kartu Memeriksa Nomor Kartu BAB 4 ATM SECURITY Card Trapping Stiker …

Edition
Ed. I
ISBN/ISSN
9789792934663
Collation
viii, 254 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.84 VYC b
Availability3
Add to basket
MARC DownloadCite
cover
Metode riset: aplikasinya dalam pemasaran
Comment Share
Supranto

Daftar isi: BAB I Berpikir secara ilmiah, dari konsep yang abstrak menjadi veriabel operasional terukur BAB II Proses riset BAB III Pemilihan judul dan perumusan persoalan riset BAB IV Rancangan riset (research design) BAB V Sumber data dan metode pengumpulan data BAB VI Pelaksanaan proyek riset dan laporan hasil riset BAB VII Penggunaan metode riset di dalam riset pemasaran BAB VIII …

Edition
Cetakan kedua
ISBN/ISSN
9795187279
Collation
xii, 455 hal.; ilus.; 24 cm
Series Title
--
Call Number
001.42 SUP m
Availability1
Add to basket
MARC DownloadCite
cover
Tutorial interaktif keamanan aplikasi dan database server berbasis open source
Comment Share
Aidil ChendramataAdhityo Priambodo

DAFTAR ISI ARSITEKTUR KEAMANAN APLIKASI DAN SERVER DATABASE SECURE SOCKET LAYER Instalasi Secure Socket Layer Konfigurasi Secure Socket Layer Pembuatan Certificate of Authority (CA) Pembuatan Certificate Signing Request (CSR) Pengesahan CSR Oleh Certificate Authority REFERENSI FILE SERVER Instalasi Samba File Server Konfigurasi Samba File Server Pengaktifan Ulang Server SAMBA …

Edition
Cetakan keempat (Edisi Revisi)
ISBN/ISSN
--
Collation
viii, 127 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.8 AID t
Availability2
Add to basket
MARC DownloadCite
cover
Dasar-dasar metode elemen hingga
Comment Share
Yerri Susatio

DAFTAR ISI BAB I PENDAHULUAN 1.1 Metode Elemen Hingga 1.2 Tahapan Yang Dilakukan 1.3 Contoh-Contoh Diskritisasi 1.4 Kelebihan dan Kekurangan dalam Penggunaan Elemen Hingga BAB II MATRIK KEKAKUAN 2.1 Matriks Kekauan Lokal BAB III INTERPOLASIPOLINOMIAL DAN SISTEM KOORDINAT 3.1 Elemen Simpleks Satu Dimensi 3.2 Elemen Simpleks Dua Dimensi 3.3 Elemen Simpleks Tiga Dimensi 3.4 Sist…

Edition
Ed. I
ISBN/ISSN
9789797311742
Collation
vii, 512 hal.; ilus.; 23 cm
Series Title
--
Call Number
511.1 YER d
Availability1
Add to basket
MARC DownloadCite
cover
Information security governace simplified: from the boardroom to the keyboard
Comment Share
Fitzgerald, Todd

Contents Chapter 1 Getting information security right: top to bottom Chapter 2 Developing information security strategy Chapter 3 Defining the security management Chapter 4 Interacting with the C-suite Chapter 5 Managing risk to an acceptable level Chapter 6 Creating effective information security policies Chapter 7 Security compliance using control frameworks Chapter 8 Managerial con…

Edition
--
ISBN/ISSN
9781439811634
Collation
xxviii, 383 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8068 FIT i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 51 52 53 54 55 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?