Politeknik Siber dan Sandi Negara memiliki layanan sistem informasi akademik bernama Manajemen Data Akademik dan Kemahasiswaan Terintegrasi (MASTER). Terdapat permalasahan keamanan dan dokumentasi aplikasi sehingga akses aplikasi harus dibatasi melalui jaringan lokal. Aplikasi ini juga dibangun dengan menerapkan arsitektur monolitik yang semua fungsinya berjalan secara mandiri dan tidak bisa be…
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed …
The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…
Daftar Isi: BAB I PENDAHULUAN 1.1 Aspek-aspek keamanan komputer 1.2 Aspek-aspek ancaman keamanan 1.3 Metodologi keamanan 1.4 Mendeteksi serangan 1.5 Mencegah 1.6 Lima langkah keamanan Komputer 1.7 Strategi dan dan taktik keamanan komputer 1.8 Password BAB II KEJAHATAN KOMPUTER 2.1 Pendahuluan 2.2 Macam-macam Serangan BAB III DASAR-DASAR KEAMANAN KOMPUTER 3.1 Apa itu Kriptogr…
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptogra…
The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk management in general to raise awareness among businesses, academics, and the general public about the cyber landscape changes and challenges that are occurring with emerging threats that will affect individual and corporate information security. As a result, the …
Introduction to Modern Cryptography is an introductory-level treatment of cryptography written from a modern, computer science perspective. It is unique in its blend of theory and practice, covering standardized cryptosystems widely used in practice without sacrificing rigor or an emphasis on foundations. It is intended to be used as a textbook in undergraduate- or graduate-level introductory c…
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and p…
Teknologi Big data & Artificial Intelligence (AI) sub study Data Science & bagian vital Revolusi industri 4.0 semakin banyak dibaca dan juga ditulis di buku ini, oleh Akademisi, Profesional Muda, Aparatur Pemerintah (ASN) & Eksekutif yang mendorong Transformasi digital dari Startup hingga BUMN dan Unicorn, bahkan Decacorn. Buku Wajib bagi Digital Native Milenia yang dari sejak lahir (digital…