Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4436 from your keywords: subject="Jamming-and-Replay"
First Page Previous 86 87 88 89 90 Next Last Page
cover
Practical Internet of things security: design a security framework for an int…
Comment Share
Russell, BrianVan Duren, Drew

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implem…

Edition
2nd edition
ISBN/ISSN
9781788622844
Collation
374 hlm
Series Title
--
Call Number
005.8 RUS p
Availability1
Add to basket
MARC DownloadCite
cover
Prosiding- machine learning for cyber security: third international conferenc…
Comment Share
Chen, XiaofengYan, HongyangZhang, XiangliangYan, Qiben

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, …

Edition
-
ISBN/ISSN
9783030622237
Collation
674 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS CHE p
Availability1
Add to basket
MARC DownloadCite
cover
Mastering windows security and hardening: secure and protect your windows env…
Comment Share
Dunkerley, MarkTumbarello, Matt

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…

Edition
-
ISBN/ISSN
9781839214288
Collation
573 hlm
Series Title
--
Call Number
005.8 DUN m
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
cover
Emerging wireless communication and network technologies: principle, paradigm…
Comment Share
Arya, Karm VeerBhadoria, Robin SinghChaudhari, Narendra S.

Table of contents Part I Wireless Technology and Communications—Explorations & Trends Advancement in Wireless Technologies and Networks Cognitive Radio Network Technologies and Applications Emerging Trends in Vehicular Communication Networks An Overview of 5G Technologies Design and Application for Reliable Cooperative Networks Semantics for Delay-Tolerant Network (DTN) Part II Wi…

Edition
-
ISBN/ISSN
9789811303951
Collation
ix, 360 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.65 ARY e
Availability1
Add to basket
MARC DownloadCite
cover
Why? cryptocurrency & blockchain: mata uang kripto dan rantai-blok
Comment Share
Cho, Youngsun

Sinopsis Mata uang kripto hampir tidak dapat diretas. Teknologi baru yang memungkinkan keamanan mata uang kripto yang ketat adalah rantai blok! Ini adalah sistem konseptual baru yang menjamin keamanan karena menyalin data dan menyimpannya di banyak komputer melalui verifikasi banyak orang. Apa yang akan terjadi di masa depan jika teknologi rantai-blok khusus ini dikombinasikan dengan Internet o…

Edition
-
ISBN/ISSN
9786230030109
Collation
158 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 CHO w
Availability1
Add to basket
MARC DownloadCite
cover
Why? cyber crime: kejahatan dunia maya
Comment Share
Park, Sejun

Kejahatan dunia maya adalah perbuatan merugikan orang lain yang dilakukan melalui jaringan informasi dari peralatan yang dilengkapi dengan internet seperti komputer, ponsel, dan lain-lain. Terdapat berbagai macam jenis kejahatan yang dapat terjadi di dunia maya, mulai dari peretasan, pencemaran nama baik, pelanggaran hak cipta, komentar jahat, dan lain sebagainya. Kejahatan dunia maya harus dih…

Edition
Pertama
ISBN/ISSN
9786230013980
Collation
193 hlm.; ilus.; 25 cm
Series Title
--
Call Number
364.168 PAR w
Availability1
Add to basket
MARC DownloadCite
cover
There you'll find me: menemukan-mu
Comment Share
Jones, Jenny B.

Hidup Finley Sinclair berubah seketika ketika kakaknya, pemuda baik hati yang beriman teguh, tewas dalam insiden pengeboman di luar negeri. Gadis delapan belas tahun itu tenggelam dalam duka dan amarah yang gelap, tapi yang paling menyedihkan adalah ia merasa dikhianati dan ditinggalkan Tuhan. Bagaimana pun Finley berusaha, ia merasa imannya perlahan menipis dan hidupnya berputar di luar kendal…

Edition
Pertama
ISBN/ISSN
9786020308142
Collation
376 hlm.; 20 cm
Series Title
--
Call Number
813 JON t
Availability1
Add to basket
MARC DownloadCite
cover
Data science using python and R
Comment Share
Larose, Chantal D.Larose, Daniel T.

Data Science Using Python and R will get you plugged into the world’s two most widespread open-source platforms for data science: Python and R. Data Science Using Python and R is written for the general reader with no previous analytics or programming experience. An entire chapter is dedicated to learning the basics of Python and R. Then, each chapter presents step-by-step instructions and w…

Edition
-
ISBN/ISSN
9781119526841
Collation
xvii, 238 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.262 LAR d
Availability0
Add to basket
MARC DownloadCite
cover
Data science fundamentals for python and mongoDB
Comment Share
Paper, David

Build the foundational data science skills necessary to work with and better understand complex data science algorithms. This example-driven book provides complete Python coding examples to complement and clarify data science concepts, and enrich the learning experience. Coding examples include visualizations whenever appropriate. The book is a necessary precursor to applying and implementing m…

Edition
-
ISBN/ISSN
9781484235966
Collation
xiii, 214 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.262 PAP d
Availability1
Add to basket
MARC DownloadCite
First Page Previous 86 87 88 89 90 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?