Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 469 from your keywords: subject="Security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Pengembangan Modul Data Induk pada Sistem Informasi Akademik Politeknik Siber…
Comment Share
Hermawan SetiawanGirinotoRay Novita YasaMuhammad Syaibani Al Hakim

Politeknik Siber dan Sandi Negara memiliki layanan sistem informasi akademik bernama Manajemen Data Akademik dan Kemahasiswaan Terintegrasi (MASTER). Terdapat permalasahan keamanan dan dokumentasi aplikasi sehingga akses aplikasi harus dibatasi melalui jaringan lokal. Aplikasi ini juga dibangun dengan menerapkan arsitektur monolitik yang semua fungsinya berjalan secara mandiri dan tidak bisa be…

Edition
-
ISBN/ISSN
--
Collation
xiv , 80 hal
Series Title
-
Call Number
2024 MUH p
Availability2
Add to basket
MARC DownloadCite
cover
Waging cyber war
Comment Share
Jacob G. Oakley

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed …

Edition
-
ISBN/ISSN
978-1-4842-4949-9
Collation
xvii, 192 hal: ilus : 25 cm
Series Title
-
Call Number
364.168 OAK w
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Schneier on Security
Comment Share
Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…

Edition
-
ISBN/ISSN
9780470395356
Collation
328hal
Series Title
-
Call Number
005.80973 SCH s
Availability2
Add to basket
MARC DownloadCite
cover
Computer security
Comment Share
Dony Ariyus

Daftar Isi: BAB I PENDAHULUAN 1.1 Aspek-aspek keamanan komputer 1.2 Aspek-aspek ancaman keamanan 1.3 Metodologi keamanan 1.4 Mendeteksi serangan 1.5 Mencegah 1.6 Lima langkah keamanan Komputer 1.7 Strategi dan dan taktik keamanan komputer 1.8 Password BAB II KEJAHATAN KOMPUTER 2.1 Pendahuluan 2.2 Macam-macam Serangan BAB III DASAR-DASAR KEAMANAN KOMPUTER 3.1 Apa itu Kriptogr…

Edition
Ed. I
ISBN/ISSN
979763163X
Collation
xvi, 381 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DON c
Availability3
Add to basket
MARC DownloadCite
cover
Cyber Defense Mechanisms Security, Privacy, and Challenges
Comment Share
Gautam Kumar

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.     The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptogra…

Edition
-
ISBN/ISSN
9780367408831
Collation
xiii, 216 hal : ill. ; 25 cm.
Series Title
-
Call Number
005.8 KUM a
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity risk management: an enterprise risk management approach
Comment Share
Kok-Boon OhBruce Ho

The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk management in general to raise awareness among businesses, academics, and the general public about the cyber landscape changes and challenges that are occurring with emerging threats that will affect individual and corporate information security. As a result, the …

Edition
-
ISBN/ISSN
9781685074289
Collation
xviii, 244 ; ilus :25cm
Series Title
-
Call Number
005.8 KOK c
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to modern cryptography, tird edition
Comment Share
Jonathan katzYehuda Lindell

Introduction to Modern Cryptography is an introductory-level treatment of cryptography written from a modern, computer science perspective. It is unique in its blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. It is intended to be used as a textbook in undergraduate- or graduate-level introductory c…

Edition
Third edition
ISBN/ISSN
9780815354369
Collation
xx, 626 hal : 26 cm
Series Title
-
Call Number
005.8 KAT i
Availability1
Add to basket
MARC DownloadCite
cover
Security and privacy in communication networks : 5th International ICST Confe…
Comment Share
Chen, YanDimitriou, Tassos D.Zhou, JianyingZhou, Jianying.

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and p…

Edition
--
ISBN/ISSN
9783642052835
Collation
xiii, 460 hlm.; ilus.; 24 cm
Series Title
5th ICST conference
Call Number
005.8 CHE s
Availability1
Add to basket
MARC DownloadCite
cover
From data science to AI ; Technology Augmented human capacity, knowledge & ap…
Comment Share
Rudi Rusdiah MaAngela Shirley SindunataAnton Adam Nangoy

Teknologi Big data & Artificial Intelligence (AI) sub study Data Science & bagian vital Revolusi industri 4.0 semakin banyak dibaca dan juga ditulis di buku ini, oleh Akademisi, Profesional Muda, Aparatur Pemerintah (ASN) & Eksekutif yang mendorong Transformasi digital dari Startup hingga BUMN dan Unicorn, bahkan Decacorn. Buku Wajib bagi Digital Native Milenia yang dari sejak lahir (digital…

Edition
-
ISBN/ISSN
9786239267230
Collation
xxiii, 262 hal ; 24 cm
Series Title
-
Call Number
005.8
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?