Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4415 from your keywords: subject="Jamming-and-Replay"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Mudahnya Membuat Web e-Learning Berbasis Web dan Android
Comment Share
Abdul Rohman

Saat ini, pembelajaran di sekolah maupun di perguruan tinggi banyak dilakukan dengan metode blended learning (perpaduan antara daring dan luring), hybrid learning (daring dan luring), dan full daring . Dengan berkembangnya teknologi informasi dan komunikasi dalam pembelajaran, maka tenaga pendidik perlu memiliki keterampilan untuk menggunakan aplikasi pembelajaran e-learning. Aplikasi e-lear…

Edition
-
ISBN/ISSN
9786230047930
Collation
x, 238 hal :ilus :23 cm
Series Title
-
Call Number
005.262 ABD m
Availability1
Add to basket
MARC DownloadCite
cover
UAV fotogrametri dalam penataan ruang
Comment Share
Galuh Shita Ayu BhidariBobby Santoso Dipokusumo

Edition
-
ISBN/ISSN
9786230107115
Collation
xxviii, 132 hal : ilus ; 21 cm
Series Title
-
Call Number
526.982 BOB u

Edition
-
ISBN/ISSN
9786230107115
Collation
xxviii, 132 hal : ilus ; 21 cm
Series Title
-
Call Number
526.982 BOB u
Availability1
Add to basket
MARC DownloadCite
cover
Membuat robot menggunakan raspberry Pi + pemrograman python
Comment Share
Mada Sanjaya

Daftar isi: BAGIAN PERTAMA Bab 1 Pengenalan robotika Bab 2 Mekatronika robot mobile Bab 3 Mekatronika robot hexapod Bab 4 Mekatronika humanoid robot Bab 5 Sistem elektonika robot Bab 6 Pengenalan dan instalasi mikroprosesor raspberry Pi Bab 7 Network mikroprosesor raspberry Pi Bab 8 Instalasi library python pada raspberry Bab 9 Dasar pemrograman python BAGIAN KEDUA Bab 10 Pemro…

Edition
-
ISBN/ISSN
9789792998856
Collation
xiv, 406 hlm.; ilus.; 23 cm
Series Title
-
Call Number
629.8 MAD m
Availability3
Add to basket
MARC DownloadCite
cover
Data mining: teori dan aplikasi rapidminer
Comment Share
Retno Tri Vulandari

Data mining adalah serangkaian proses untuk menggali nilai tambah berupa informasi yang selama ini tidak diketahui secara manual dari suatu basis data. Informasi diperoleh dengan cara mengekstraksi dan mengenali pola data yang terdapat pada basis data.Buku ini berisi ringkasan-ringkasan dari mulai materi konsep data mining, teknik klasifikasi decision tree, support vector machine, teorema bayes…

Edition
-
ISBN/ISSN
9786026948922
Collation
viii, 124 hal : ilus ; 23 cm
Series Title
-
Call Number
006.312 RET d
Availability1
Add to basket
MARC DownloadCite
cover
Pengetahuan Komputer dan Teknologi Informasi
Comment Share
Jack Febrian

Menyajikan tentang berbagai hal penting sekitar dunia komputer dan teknologi informasi

Edition
-
ISBN/ISSN
9793338369
Collation
-
Series Title
-
Call Number
004 JAC p
Availability2
Add to basket
MARC DownloadCite
cover
Ethical hacking with kali linux: learn fast how to hack line a pro
Comment Share
Hugo Hoffman

The contents in this book will provide practical hands on implementation and demonstration guide on how you can use Kali Linux to deploy various attacks on both wired and wireless networks. If you are truly interested in becoming an Ethical Hacker or Penetration Tester, this book is for you.NOTE: If you attempt to use any of this tools on a wired or wireless network without being authorized and…

Edition
1
ISBN/ISSN
9798636485780
Collation
152 hal : :ilus: 24cm
Series Title
-
Call Number
005.8 HOF e
Availability1
Add to basket
MARC DownloadCite
cover
Buku materi pokok pengantar ilmu komunikasi
Comment Share
Nunung Prajarto

Buku Materi Pokok (BMP) SKOM4101 PENGANTAR ILMU KOMUNIKASI, merupakan mata kuliah paling dasar dalam mempelajari ilmu komunikasi. Di dalamnya membahas tentang kegiatan komunikasi yang dilakukan manusia, sejarah perkembangan dan keberadaan ilmu komunikasi, pengertian dan proses berlangsungnya komunikasi, komponen-komponen dan model-model komunikasi, fungsi komunikasi, teknik-teknik dan media dal…

Edition
edisi 3
ISBN/ISSN
9789790119581
Collation
423 hal, ilus ; 21 cm
Series Title
-
Call Number
302.2 NUN b
Availability1
Add to basket
MARC DownloadCite
cover
Pemasaran jasa: tren pemasaran pada era digital
Comment Share
Acal Sudirman

Sistematika buku Pemasaran Jasa: Tren Pemasaran Pada Era Digital ini mengacu pada pendekatan konsep teoritis dan contoh penerapan. Buku ini terdiri atas 16 bab yang dibahas secara rinci, diantaranya: Bab 1 Konsep dan Sistem Pemasaran Jasa, Bab 2 Dinamika Bisnis Jasa dan Pentingnya Pemasaran Jasa, Bab 3 Perencanaan Strategis dan Proses Pemasaran Jasa, Bab 4 Perilaku Konsumen dalam Konteks Jasa, …

Edition
-
ISBN/ISSN
9786231954213
Collation
viiii, 241 hal : ilus ; 24cm
Series Title
-
Call Number
658.8 ACA p
Availability1
Add to basket
MARC DownloadCite
cover
Understanding cryptography : a textbook for students and practitioners
Comment Share
Paar, ChristofCraig, Allen T.McKean, Joseph W.Pelzl, Jan

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…

Edition
first
ISBN/ISSN
9783642041006
Collation
xviii, 372 p. : ill. ; 24 cm
Series Title
null
Call Number
005.82 PAA u
Availability2
Add to basket
MARC DownloadCite
cover
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Comment Share
Jack Koziol,Chris AnleyDavid Litchfield,

Description Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating sy…

Edition
1
ISBN/ISSN
9780764544682
Collation
xxiii, 620 p. : ill. ; 24 cm.
Series Title
-
Call Number
0058 KOZ s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?