Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 7 from your keywords: subject="Computer network prot...
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, AnishStebila, Douglas

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the author…

Edition
2nd Edition
ISBN/ISSN
9783662581452
Collation
xxviii, 521 hlm.: ilus.; 24 cm
Series Title
Information Security and Cryptography
Call Number
005.82 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Intrusion prevention and active response: deploying network and host IPS
Comment Share
Rash, Michael

Terdapat indeks. Table of contents: 1. Intrusion prevention and active response 2. Packet inspection for intrusion analysis 3. False positives and real damage 4. Four layers of IPS actions 5. Network inline data modification 6. Protecting your host through the operating system 7. IPS at the application layer 8. Deploying open source IPS solutions 9. IPS evasion techniques (network)

Edition
--
ISBN/ISSN
9781932266474
Collation
xx, 402 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 RAS i
Availability1
Add to basket
MARC DownloadCite
cover
Practical packet analysis: using Wireshark to solve real-world network problems
Comment Share
Sanders, Chris

Table of Contents Chapter 1 Packet Analysis and Network Basics Packet Analysis and Packet Sniffers How Computers Communicate Traffic Classifications Final Thoughts Chapter 2 Tapping into the Wire Living Promiscuously Sniffing Around Hubs Sniffing in a Switched Environment Sniffing in a Routed Environment …

Edition
2nd Edition
ISBN/ISSN
9781593272661
Collation
xx, 255 hal.; ilus.; 24 cm
Series Title
--
Call Number
004.66 SAN p
Availability1
Add to basket
MARC DownloadCite
cover
Packet guide to core network protocols
Comment Share
Hartpence, Bruce

Table of Contents Chapter 1 Networking Models What Is a Model? Why Use a Model? OSI Model Introducing TCP/IP Chapter 2 Ethernet Remember the Models Structure Ethernet Type II vs. 802.3 MAC Addresses—Another Look Ethernet Operation Shared Media Physical Layer Encoding Other Types of Signaling Topologies Final Th…

Edition
--
ISBN/ISSN
9781449306533
Collation
xv, 137 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.62 HAR p
Availability1
Add to basket
MARC DownloadCite
cover
Protocols for authentication and key establishment
Comment Share
Boyd, ColinMathuria, Anish

Table of contents: 1. A Tutorial Introduction to Authentication and Key Establishment 2. Goals for Authentication and Key Establishment 3. Protocols Using Shared Key Cryptography 4. Authentication and Key Transport Using Public Key Cryptography 5. Key Agreement Protocols 6. Conference Key Protocols 7. Password-Based Protocols A. Standards for Authentication and Key Establishment B. Sum…

Edition
--
ISBN/ISSN
9783642077166
Collation
xxiv, 320 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 BOY p
Availability1
Add to basket
MARC DownloadCite
cover
Cryptographic protocol: security analysis based on trusted freshness
Comment Share
Kefei, ChenLing, Dong

Contents: - Introduction of Cryptographic Protocol. - Informal Analysis. - Informal Analysis of Cryptographic Protocols. - Formal Approaches to Security Definition. - Formal Approaches to Security Establishment of Authentication Protocols. - Belief Multisets to Security Establishment of Authentication Protocols. - Automation Approaches to Security Establishment of Authentication Protoc…

Edition
-
ISBN/ISSN
9787040313314
Collation
xi, 373 hlm.; 24 cm.
Series Title
Information Security
Call Number
005.82 LIN c
Availability1
Add to basket
MARC DownloadCite
cover
Secure key establishment
Comment Share
Choo, Kim Kang Raymond

Contents: 1 Introduction 2 Background Materials 3 A Flawed BR95 Partnership Function 4 On The Key Sharing Requirement 5 Comparison of Bellare–Rogaway and Canetti–Krawczyk Models 6 An Extension to the Bellare–Rogaway Model 7 Proof of Revised Yahalom Protocol 8 Errors in Computational Complexity Proofs for Protocols 9 On Session Key Construction 10 Complementing Computational Pro…

Edition
-
ISBN/ISSN
9780387879680
Collation
xxiii, 209 hlm.; 24 cm.
Series Title
Advanced in information security
Call Number
005.8 CHO s
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?