Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 723 from your keywords: subject="--"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Lai-massey cipher designs : history, design criteria and cryptanalysis
Comment Share
Nakahara, Jorge Jr.

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …

Edition
-
ISBN/ISSN
9783319682723
Collation
xvii, 726 hlm; 23,5 cm
Series Title
-
Call Number
005.82 NAK l
Availability2
Add to basket
MARC DownloadCite
cover
Semua bisa menjadi programmer laravel basic
Comment Share
Yuniar SupardiSulaeman

Buku dengan judul “Semua Bisa Menjadi Programmer Laravel Basic” ini merupakan buku dasar dalam mempelajari framework PHP dengan Laravel yang saat ini sedang populer. Dengan buku ini, tandanya Anda sudah belajar sampai tingkat menengah. Akan dibahas pula kelebihan dari script server programming dengan Laravel, serta materi lengkap dari dasar hingga menengah. Keunggulan buku ini adalah dapat …

Edition
-
ISBN/ISSN
9786230010460
Collation
xiv, 314 hlm.; 23 cm
Series Title
-
Call Number
005.262 YUN s
Availability1
Add to basket
MARC DownloadCite
cover
Multivariate public key cryptosystems (advances in information security book 80)
Comment Share
Ding, JintaiPetzoldt, AlbrechtSchmidt, Dieter S.

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. Table of Contents 1. Introduction 2. Multivariate Cryptography 3. The Matsumoto-Imai Cryptosystem 4. Hidden Field Equations 5. Oil and Vinegar 6. MQDSS 7. The SimpleMatrix Encryption Scheme 8. …

Edition
2nd ed
ISBN/ISSN
9781071609859
Collation
xxv, 253 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 DIN m
Availability1
Add to basket
MARC DownloadCite
cover
Data security in cloud storage (wireless networks)
Comment Share
Zhang, YuanXu, ChunxiangShen, Xuemin Sherman

Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D

Edition
-
ISBN/ISSN
9789811543739
Collation
xii, 171 hlm.; ilus.; 24 cm
Series Title
-
Call Number
004.6782 ZHA d
Availability1
Add to basket
MARC DownloadCite
cover
Panduan praktis dan jitu menguasai framework laravel 6
Comment Share
Anton Subagia

Daftar isi: Bab 1. Lingkup software Bab 2. Database postgresSQL Bab 3. Magic property Bab 4. Magic property Bab 5. Implementasi AJAX Bab 6. Trik laravel 1 Bab 7. Trik laravel 2

Edition
-
ISBN/ISSN
9786237156048
Collation
140 hlm.; 21 cm
Series Title
-
Call Number
005.262 ANT p
Availability2
Add to basket
MARC DownloadCite
cover
Lattice-based cryptosystems: a design perspective
Comment Share
Zhang, JiangZhang, Zhenfeng

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based e…

Edition
-
ISBN/ISSN
9789811584268
Collation
xiii, 174 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.82 ZHA l
Availability1
Add to basket
MARC DownloadCite
cover
Cybersecurity in humanities and social sciences: a research methods approach
Comment Share
Loiseau, HugoVentre, DanielAden, Hartmut

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…

Edition
-
ISBN/ISSN
9781786305398
Collation
xiv, 209 hlm.; ilus.; 24 cm
Series Title
-
Call Number
005.8072 LOI c
Availability1
Add to basket
MARC DownloadCite
cover
The cybersecurity playbook: how every leader and employee can contribute to a…
Comment Share
Cerra, Allison

Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …

Edition
-
ISBN/ISSN
9781119442196
Collation
ix, 212 hlm; 23 cm
Series Title
-
Call Number
005.8 CER c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography arithmetic: algorithms and hardware architectures (advances in i…
Comment Share
Omondi, Amos R.

This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…

Edition
-
ISBN/ISSN
9783030341411
Collation
xiv, 336 hlm.: ilus.; 24 cm
Series Title
Advances in Information Security Book 77
Call Number
005.82 OMO c
Availability1
Add to basket
MARC DownloadCite
cover
Privacy, regulations, and cybersecurity: the essential business guide
Comment Share
Moschovitis, Chris

This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…

Edition
-
ISBN/ISSN
9781119658740
Collation
xvii, 398 hlm.; ilus.; 23,7 cm
Series Title
-
Call Number
005.8 MOS p
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?