Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 469 from your keywords: subject="Security"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Data and cyber security technology, use case, and governance
Comment Share
Indra UtoyoHammam RizaDavid DarmawanThomas LaheyJamalul IzzaEdwin LimRohit KumarWendi UsinoRudi Rusdiah Ma

Dari landscape evolusi internet, setelah era PC terjadi peningkatan tajam pengguna internet dan semua kegiatan yang kita lakukan secara online, mendorong peningkatan data secara exponensial, sehingga melahirkan era big data, karena proses datafication, analytics dan data mining oleh Data Driven Entreprise sebagai Data Controller yang mengumpulkan data dari semua kegiatan kita sehari-hari. Co…

Edition
Pertama
ISBN/ISSN
9786239267216
Collation
xx, 240 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 HAM d
Availability3
Add to basket
MARC DownloadCite
cover
Revolution in data science, ai & cybersecurity in connected word
Comment Share
Rudi Rusdiah Ma

ABDI mengundang penulis dan pakar dari dalam dan luar negeri yang peduli terhadap kemajuan ilmu pengetahuan dan tingginya adaptasi dan adoptasi teknologi Industri 4.0 di Indonesia oleh Masyarakat Indonesia. Presiden Jokowi juga menekankan pentingnya penguasaan teknologi Al, Data Science, Cyber Security hingga Metaverse, oleh bangsa Indonesia, karena perubahan semakin masif, cepat dan perubahan …

Edition
-
ISBN/ISSN
9786239267254
Collation
180 hal : 24 cm
Series Title
-
Call Number
005.8 RUD r
Availability1
Add to basket
MARC DownloadCite
cover
The Security Risk Assessment Handbook: A Complete Guide for Performing Securi…
Comment Share
Douglas J. Landoll

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of p…

Edition
Third edition
ISBN/ISSN
9781032041650
Collation
514 hal : 25 cm
Series Title
-
Call Number
R 658.47 LAN s
Availability1
Add to basket
MARC DownloadCite
cover
Complexity theory and cryptology: an introduction to cryptocomplexity
Comment Share
Rothe, Jorg

Contents 1 Introduction to Cryptocomplexity 2 Foundations of Computer Science and Mathematics 3 Foundations of Complexity Theory 4 Foundations of Cryptology 5 Hierarchies Based on NP 6 Randomized Algorithms and Complexity Classes 7 RSA Cryptosystem, Primality, and Factoring 8 Other Public-Key Cryptosystems and Protocols References

Edition
--
ISBN/ISSN
9783540221470
Collation
xi, 481 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 ROT c
Availability2
Add to basket
MARC DownloadCite
cover
Practical cryptography
Comment Share
Ferguson, NielsSchneier, Bruce

Terdapat indeks. Table of contents: 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I_ Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II_ Key Negotiation. 10. Generating Rando…

Edition
First edition
ISBN/ISSN
9780471223573
Collation
xx, 410 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 FER p
Availability10
Add to basket
MARC DownloadCite
cover
Penanganan keamanan jaringan komputer
Comment Share
Bambang Kelana SimponyKyla Salwa Putri DenillaRatu Riqsa Aqidah RidwanMuhammad Ikhsan

Buku ini membahas tiga hal penting yang saling berkaitan dalam lingkup ilmu komputer. Pertama membahas tentang Keamanan Jaringan Komputer dimulai dari pembahasan dasar keamanan jaringan komputer, dasar dalam keamanan sistem informasi, firewall, malware pada jaringan komputer, sampai ke pembahasan keamanan mail server, dan tidak hanya itu membahas juga keamanan pada jaringan nirkabel. Hal kedua …

Edition
Ed.1
ISBN/ISSN
9786236433188
Collation
xi, 112 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BAM p
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27005 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…

Edition
Third edition
ISBN/ISSN
--
Collation
vi, 53 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27000 -- Information technology -- security techniques -- Information…
Comment Share
ISO/IEC

Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …

Edition
Fifth edition
ISBN/ISSN
--
Collation
v, 27 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents: Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 7.1 General 7.2 Unauthorized access 7.3 Packet sniffing 7.4 Rogue wireless access point 7.5 Denial of service attack 7.6 Bluejacking 7.7 Bluesnarfing 7.8 Adhoc networks 7.9 Other threats 8 Security requirements 8…

Edition
First edition
ISBN/ISSN
--
Collation
vii, 26 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27002 -- Information technology -- security techniques -- code of pra…
Comment Share
ISO/IECReference

Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…

Edition
Second edition
ISBN/ISSN
--
Collation
vii, 80 hlm.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?