Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4415 from your keywords: subject="Jamming-and-Replay"
First Page Previous 6 7 8 9 10 Next Last Page
cover
System analysis and design
Comment Share
Rosenblatt, Harry J.Tilley, Scott R.

Discover a practical, streamlined, updated approach to information systems development that covers both traditional and emerging technologies and approaches to systems analysis and design. SYSTEMS ANALYSIS AND DESIGN, 11E offers a well-organized, streamlined approach. Chapter objectives are keyed directly to chapter headings, making content easy to comprehend and convenient to study. Numerous r…

Edition
Eleventh Edition
ISBN/ISSN
9781305494602
Collation
xx, 572 hlm; 28 cm
Series Title
Shelly Cashman Series
Call Number
003 TIL s
Availability1
Add to basket
MARC DownloadCite
cover
Randomized algorithms
Comment Share
Prabhakar RaghavanRajeev Motwani,

Cambridge University Press, 25 Agu 1995 - 476 halaman For many applications a randomized algorithm is either the simplest algorithm available, or the fastest, or both. This tutorial presents the basic concepts in the design and analysis of randomized algorithms. The first part of the book presents tools from probability theory and probabilistic analysis that are recurrent in algorithmic applic…

Edition
first edition
ISBN/ISSN
9780521474658
Collation
xiv, 476 hal. : ilus ; 26 cm.
Series Title
-
Call Number
004.015192 MOT r
Availability1
Add to basket
MARC DownloadCite
cover
Network:tweaking dan hacking: trik menjelajahi jaringan yang jarang diungkapkan
Comment Share
Efvy Zam

Daftar isi: Bab 1 Otak-atik jaringan dengan command prompt Bab 2 Menjelajah jaringan Bab 3 Otak-atik jaringan wireless Bab 4 Mencari sinyal kuat jaringan wireless Bab 5 Memutuskan koneksi internet komputer lain Bab 6 Menembus blokir internet dengan duplikasi MAC address Bab 7 Membuka jaringan wireless yang tersembunyi Bab 8 Mendeteksi spoofing Bab 9 Mengontrol bandwidth dan …

Edition
-
ISBN/ISSN
9786020497082
Collation
ix, 204 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 EFV n
Availability5
Add to basket
MARC DownloadCite
cover
Bluetooth end to end
Comment Share
Diane McMichael GilsterD.M. Bakker a

Bluetooth End to End is a comprehensive look at the technology from the standpoint of the IT Professional. The book goes above and beyond a simple re-hashing of the specification to provide practical implementation information on Bluetooth technology application fundamentals, implementation, wireless networking, Bluetooth security considerations, chip technology and the required specifications …

Edition
first edition
ISBN/ISSN
9780764548871
Collation
xxiii, 309 hal : ilus. ; 24 cm.
Series Title
-
Call Number
621.39 BAK b
Availability1
Add to basket
MARC DownloadCite
cover
Foundations of cryptography: basic techniques Volume I
Comment Share
Goldreich, Oded

Contents 1. Introduction 1.1 Cryptography: main topics 1.2 Some background from probability theory 1.3 The computational model 1.4 Motivation to the rigorous treatment 1.5 Miscellaneous 2. Computational difficulty 2.1 One- way functions: motivation 2.2 One-way functions: definitions 2.3 Weak one- way functions imply strong ones 2.4 One-way functions : variations 2.5 Hard-core pr…

Edition
--
ISBN/ISSN
0521791723
Collation
xix, 372 hlm.; 25 cm.
Series Title
--
Call Number
005.8 GOL f
Availability4
Add to basket
MARC DownloadCite
cover
Voice enabling the data network : H.323, MGCP, SIP, QoS, SLAs, and security
Comment Share
James F. Durkin.

Assist Telco and ISP engineers and technicians in their transition to IP telephony Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks Provides a step-by-step approach to designing a VoIP network Outlines each VoIP technology components with detailed descriptions of possible applications Provides a thorough description of Voice over…

Edition
-
ISBN/ISSN
9781587050145
Collation
xv, 200 p. : ill. ; 24 cm.
Series Title
-
Call Number
004.695 DUR v
Availability1
Add to basket
MARC DownloadCite
cover
System-on-Chip architectures and implementations for private-Key data encryption
Comment Share
Máire McLoone ,John V. McCanny

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and e…

Edition
-
ISBN/ISSN
9780306478826
Collation
vi, 160 hal ; ilus ; 23 cm
Series Title
-
Call Number
005.8 MCL s
Availability1
Add to basket
MARC DownloadCite
cover
Counter Hack Reloaded
Comment Share

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive att…

Edition
-
ISBN/ISSN
9780131481046
Collation
xxxii, 748 hal. : ilus ; 24 cm.
Series Title
-
Call Number
005.8 SKO c
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography: theory and practice
Comment Share
Wenbo Mao

Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" i…

Edition
-
ISBN/ISSN
9780130669438
Collation
xxxviii, 707 hlm.; 24 cm.
Series Title
-
Call Number
005.8 WEN m
Availability2
Add to basket
MARC DownloadCite
cover
Pemrograman Aplikasi Android Dengan Sencha Touch
Comment Share
Ignas

Sencha adalah salah satu yang tergerak untuk mengakomodasi para pengembang web dalam membuat aplikasi Android. Dengan Sencha Touch, Anda dapat membuat aplikasi Android menggunakan bahasa pemrograman web, yaitu HTML, CSS, dan JavaScript. Buku Pemrograman Aplikasi Android dengan Sencha Touch ini membahas secara praktis bagaimana membuat aplikasi Android menggunakan Sencha Touch. Setelah memahami …

Edition
-
ISBN/ISSN
9789792950595
Collation
vi, 154 hlm.ilus ; 23 cm
Series Title
-
Call Number
005.369 Ign p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?