Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 154 from your keywords: subject="Science"
First Page Previous 6 7 8 9 10 Next Last Page
cover
Rational rose untuk pemodelan berorientasi objek
Comment Share
Adi Nugroho

Daftar isi: Bab 1 Pendahuluan : Pemrograman Berorientasi Objek, UML, Dan Rational Rose 1.1 Pemrograman Berorientasi Objek 1.2 Analisis dan Perancangan Sistem Dengan Metodologi Berorientasi objek 1.3 UML (Unified Modelling Language) 1.4 Rational Rose Bab 2 Pemodelan Bisnis 2.1 Mengapa Perlu Dilakukan Pemodelan Bisnis? 2.2 Pemodelan Bisnis sebagai Proses Iteratif 2.3 Konsep-konsep …

Edition
Cetakan pertama
ISBN/ISSN
979-3338-61-X
Collation
xiv, 306 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.11 ADI r
Availability2
Add to basket
MARC DownloadCite
cover
Applied cryptanalysis: breaking ciphers in the real world
Comment Share
Stamp, MarkLow, Richard M.

Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra

Edition
--
ISBN/ISSN
9780470114865
Collation
xix, 401 hlm.; 24 cm.
Series Title
--
Call Number
005.82 STA a
Availability14
Add to basket
MARC DownloadCite
cover
Implementing SSL/TLS using cryptography and PKI
Comment Share
Davies, Joshua

Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…

Edition
--
ISBN/ISSN
9780470920411
Collation
xxxii, 663 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 DAV i
Availability2
Add to basket
MARC DownloadCite
cover
Recent advances in RSA cryptography
Comment Share
Katzenbeisser, Stefan

Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures

Edition
--
ISBN/ISSN
9781461355502
Collation
xiii, 139 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 KAT r
Availability1
Add to basket
MARC DownloadCite
cover
Differential cryptanalysis on hash functions: theory and practice (attack alg…
Comment Share
Tao, XieFanbao, Liu

Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research

Edition
--
ISBN/ISSN
9783659612008
Collation
xiv, 362 hal.; ilus.; 22 cm
Series Title
--
Call Number
005.82 TAO d
Availability1
Add to basket
MARC DownloadCite
cover
Internet security: cryptographic principles, algorithms, and protocols
Comment Share
Man, Young Rhee

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i

Edition
--
ISBN/ISSN
470852852
Collation
xvii, 405 hlm.; 25 cm.
Series Title
--
Call Number
005.8 MAN i
Availability9
Add to basket
MARC DownloadCite
cover
Object-oriented software engineering: an agile unified methodology
Comment Share
Kung, David C.

Part 1 - Introduction and System Engineering Chapter 1) Introduction Chapter 2) Software Process and Methodology Chapter 3) System Engineering Part 2 - Analysis and Architectural Design Chapter 4) Software Requirements Elicitation Chapter 5) Domain Modeling Chapter 6) Architectural Design Part 3 - Modeling and Design of Interactive Chapter 7) Deriving Use Cases from Requirements C…

Edition
International Student Edition
ISBN/ISSN
9781259080791
Collation
xx, 700 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.11 KUN o
Availability1
Add to basket
MARC DownloadCite
cover
Modern cryptography primer: theoretical foundations dan practical applications
Comment Share
Koscielny, CzeslawKurkowski, MiroslawSrebrny, Marian

Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security

Edition
--
ISBN/ISSN
9783642413858
Collation
xiv, 238 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.82 KOS m
Availability1
Add to basket
MARC DownloadCite
cover
Understanding bitcoin: cryptography, engineering and economics
Comment Share
Franco, Pedro

Contents Part one: Introduction and economics Chapter 1 Foundation Chapter 2 Technology (Introduction) Chapter 3 Economics Chapter 4 Business applications Part Two: Bitcoin technology Chapter 5 Public key cryptography Chapter 6 Transactions Chapter 7 The blockchain Chapter 8 Wallets Chapter 9 Mining Part Three: The cryptocurrencies landscape Chapter 10 The origins of bitcoin C…

Edition
--
ISBN/ISSN
9781119019169
Collation
xx, 268 hal.; ilus.; 25 cm
Series Title
--
Call Number
005.8 FRA u
Availability1
Add to basket
MARC DownloadCite
cover
Security without obscurity a guide to PKI operations
Comment Share
Stapleton, J. J.Epstein, W. Clay

Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI

Edition
--
ISBN/ISSN
9781498707473
Collation
xv, 343 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.82 STA s
Availability1
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9 10 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?