Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 771 from your keywords: subject="--"
First Page Previous 66 67 68 69 70 Next Last Page
cover
Cryptonomicon
Comment Share
Stephenson, Neal

With this extraordinary first volume in what promises to be an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century. In 1942, Lawrence Pritchard Waterhouse - mathematical genius and young Captain in the U.S. Navy - is assigned to detachment 2702. It is an…

Edition
-
ISBN/ISSN
99410672
Collation
918 hlm.; 20 cm.
Series Title
-
Call Number
813.54 STE c
Availability1
Add to basket
MARC DownloadCite
cover
Encyclopedia of cryptography and security
Comment Share
Tilborg, Henk C.A. van

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A-Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providin…

Edition
-
ISBN/ISSN
9780387234731
Collation
xi, 684 hlm.; 28 cm.
Series Title
-
Call Number
R005.803 TIL e
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security: principle and practices
Comment Share
Stallings, William

Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…

Edition
Fifth Edition
ISBN/ISSN
9780136097044
Collation
xxiii, 743 hlm.; 25 cm.
Series Title
-
Call Number
005.82 STA c
Availability2
Add to basket
MARC DownloadCite
cover
Hiding in plain sight: steganography and the art of covert communication
Comment Share
Cole, Eric

Contents: Introduction. Part One: Exploring the World of Covert Communication. Chapter 1: Covert Communication: It’s All Around You. Chapter 2:” Cryptography Explained. Chapter 3 :Hiding the Goods with Steganography. Chapter 4: Digital Watermarking. Part Two: The Hidden Realm of Steganography. Chapter 5: Steganography at Large. Chapter 6: Nuts and Bolts of…

Edition
-
ISBN/ISSN
471444499
Collation
xviii, 335 hlm.; 24 cm.
Series Title
-
Call Number
005.8 COL h
Availability1
Add to basket
MARC DownloadCite
cover
The codebreakers: the story of secret writing
Comment Share
Kahn, David

Edition
-
ISBN/ISSN
722151462
Collation
xvi, 476 hlm.; 18 cm.
Series Title
-
Call Number
652.8 KAH c

Edition
-
ISBN/ISSN
722151462
Collation
xvi, 476 hlm.; 18 cm.
Series Title
-
Call Number
652.8 KAH c
Availability0
Add to basket
MARC DownloadCite
cover
Secure key establishment
Comment Share
Choo, Kim Kang Raymond

Contents: 1 Introduction 2 Background Materials 3 A Flawed BR95 Partnership Function 4 On The Key Sharing Requirement 5 Comparison of Bellare–Rogaway and Canetti–Krawczyk Models 6 An Extension to the Bellare–Rogaway Model 7 Proof of Revised Yahalom Protocol 8 Errors in Computational Complexity Proofs for Protocols 9 On Session Key Construction 10 Complementing Computational Pro…

Edition
-
ISBN/ISSN
9780387879680
Collation
xxiii, 209 hlm.; 24 cm.
Series Title
Advanced in information security
Call Number
005.8 CHO s
Availability1
Add to basket
MARC DownloadCite
cover
Internet cryptography
Comment Share
Smith, Richard E.

CONTENTS: 1. Introduction - The Basic Problem. - Essentials of Crypto. - Crypto Is Hard to Use. - Balancing Crypto Use with Your Objectives. - Essentials of Networking and the Internet. - Protocol Layers and Network Products. - Internet Technology. - Internet Protocols in Your Host. - The Internet Security Problem. - An Internet Rogue's Gallery. - Setting Realistic Security Objecti…

Edition
-
ISBN/ISSN
201924803
Collation
xx, 356 hlm.: ilus.; 25 cm.
Series Title
-
Call Number
005.8 SMI i
Availability4
Add to basket
MARC DownloadCite
cover
Sistem biometrika : konsep dasar teknik analisis citra, dan tahapan membangun…
Comment Share
Darma, Putra

Isi: - Sistem Biometrika - Karakter Biometrika - Pre-Processing - Pemisahan Ciri - Pencocokan - Sistem Verifikasi dengan Menggabungkan Biometrika Telapak Tangan dan Geometri Tangan - Verifikasi Citra Tanda Tangan dengan Metode Pola Busur Terlokalisasi - Sistem Verifikasi Sidik Jari Berbasis Bank Tapis Gabor - Sistem Screening Menggunakan Gabungan Citra Wajah dan Telapak Tangan dengan…

Edition
-
ISBN/ISSN
9789792906370
Collation
xviii, 335 hlm.; 23 cm.
Series Title
-
Call Number
006.4 DAR s
Availability1
Add to basket
MARC DownloadCite
cover
Multimedia content encryption: techniques and applications
Comment Share
Lian, Shiguo

Content list: Chapter 1 Introduction 1.1 Background 1.2 Definition 1.3 History 1.4 Classification 1.5 Book Organization Chapter 2 Performance Requirement of Multimedia Content Encryption 2.1 Introduction 2.2 Security Requirement 2.3 Compression Efficiency 2.4 Encryption Efficiency 2.5 Format Compliance 2.6 Application Suitability Chapter 3 Fundamental Techniques 3.1…

Edition
-
ISBN/ISSN
9781420065275
Collation
xvii, 217 hlm.; 24 cm.
Series Title
-
Call Number
005.82 LIA m
Availability1
Add to basket
MARC DownloadCite
cover
Basic research methods for librarians
Comment Share
Connaway, Lynn SilipigniPowell, Ronald R.

Contents: -- Research and librarianship -- Developing the research study -- Selecting the research method -- Survey research and sampling -- Data collection techniques -- Experimental research -- Qualitative research methods -- Historical research -- Analysis of data -- Writing the research proposal -- Presentation of the research report.

Edition
Fifth Edition
ISBN/ISSN
9781591588658
Collation
xii, 370 hlm.; 26 cm.
Series Title
Library and Information Science Text Series
Call Number
020.72 CON b
Availability0
Add to basket
MARC DownloadCite
First Page Previous 66 67 68 69 70 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?