Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 78 from your keywords: subject="Data Encryption"
First Page Previous 6 7 8
cover
A statistical test suite for random and pseudorandom number generators for cr…
Comment Share
Banks, DavidBarker, AlaineBassham III, Lawrence EDray, JamesHeckert, AlanLeigh, StefanLevenson, MarkNechvatal, JamesRukhin, AndrewSmid, MilesSoto, JuanVangel, MarkVo, San

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s

Edition
Special Publication 800-22, Revision 1
ISBN/ISSN
-
Collation
vii, 113 hlm.; 25 cm.
Series Title
-
Call Number
R005.82 DEP s
Availability2
Add to basket
MARC DownloadCite
cover
RSA security's official guide to cryptography
Comment Share
Burnett, StevePaine, Stephen

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r

Edition
-
ISBN/ISSN
72192259
Collation
xxi, 419 hlm.; 25 cm.
Series Title
-
Call Number
005.82 BUR r
Availability1
Add to basket
MARC DownloadCite
cover
The Hash function BLAKE
Comment Share
Aumasson, Jean-PhilippeHenzen, LucaMeier, WiliPhan, Raphael C.-W.

CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…

Edition
-
ISBN/ISSN
9783662447567
Collation
Berlin
Series Title
Information Security and Crypography
Call Number
005.8 AUM h
Availability1
Add to basket
MARC DownloadCite
cover
Everyday cryptography : fundamental principles and applications
Comment Share
Martin, Keith M

Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…

Edition
-
ISBN/ISSN
9780199695591
Collation
xxi, 530 hlm.: ilus.; 23 cm.
Series Title
-
Call Number
652.8 MAR e
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability6
Add to basket
MARC DownloadCite
cover
Internet Cryptography
Comment Share
Smith, Richard E.

Edition
Cet. 5
ISBN/ISSN
201924803
Collation
xx, 356 hlm., ilus.,
Series Title
-
Call Number
652.8 SMI i

Edition
Cet. 5
ISBN/ISSN
201924803
Collation
xx, 356 hlm., ilus.,
Series Title
-
Call Number
652.8 SMI i
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?