Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 274 from your keywords: subject="Computer security"
1 2 3 4 5 Next Last Page
cover
Revolution in data science, ai & cybersecurity in connected word
Comment Share
Rudi Rusdiah

ABDI mengundang penulis dan pakar dari dalam dan luar negeri yang peduli terhadap kemajuan ilmu pengetahuan dan tingginya adaptasi dan adoptasi teknologi Industri 4.0 di Indonesia oleh Masyarakat Indonesia. Presiden Jokowi juga menekankan pentingnya penguasaan teknologi Al, Data Science, Cyber Security hingga Metaverse, oleh bangsa Indonesia, karena perubahan semakin masif, cepat dan perubahan …

Edition
-
ISBN/ISSN
9786239267254
Collation
180 hal : 24 cm
Series Title
-
Call Number
005.8 RUD r
Availability2
Add to basket
MARC DownloadCite
cover
Primality testing and integer factorization in public-key cryptography
Comment Share
Song Y. Yan.

Primality Testing and Integer Factorization in Public-Key Cryptography introduces various algorithms for primality testing and integer factorization, with their applications in public-key cryptography and information security. More specifically, this book explores basic concepts and results in number theory in Chapter 1. Chapter 2 discusses various algorithms for primality testing and prime num…

Edition
first edition
ISBN/ISSN
9781402076497
Collation
xvi, 236 hal : ilus. ; 25 cm.
Series Title
-
Call Number
005.82 YAN p
Availability1
Add to basket
MARC DownloadCite
cover
Understanding cryptography : a textbook for students and practitioners
Comment Share
Paar, ChristofCraig, Allen T.McKean, Joseph W.Pelzl, Jan

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…

Edition
first
ISBN/ISSN
9783642041006
Collation
xviii, 372 p. : ill. ; 24 cm
Series Title
null
Call Number
005.82 PAA u
Availability2
Add to basket
MARC DownloadCite
cover
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Comment Share
Jack Koziol,Chris AnleyDavid Litchfield,

Description Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating sy…

Edition
1
ISBN/ISSN
9780764544682
Collation
xxiii, 620 p. : ill. ; 24 cm.
Series Title
-
Call Number
0058 KOZ s
Availability1
Add to basket
MARC DownloadCite
cover
Cryptographic Security Architecture Design and Verification
Comment Share
Peter Gutmann ·

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular …

Edition
-
ISBN/ISSN
9780387215518
Collation
320 hal
Series Title
-
Call Number
005.8 GUT c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography for Internet and database applications : developing secret and p…
Comment Share
Nick Galbreath

Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applica…

Edition
-
ISBN/ISSN
0471210293
Collation
-
Series Title
-
Call Number
005.8 GAL c
Availability1
Add to basket
MARC DownloadCite
cover
NET security and cryptography
Comment Share
Peter ThorsteinsonArun Ganesh

Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantia…

Edition
-
ISBN/ISSN
9780131008551955499
Collation
xvii, 466 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 THO n
Availability1
Add to basket
MARC DownloadCite
cover
Kajian ketahanan siber: manajemen kerentanan
Comment Share
Nanang TriantoSusila WindartaTaufik NurhidayatNur Annisa Kadarwati FebriyaniDigit Oktacvianto

Tren serangan siber kian hari kian meningkat, tentunya hal ini menimbulkan risiko yang lebih besar terhadap kerentanan pada sistem elektronik. Organisasi perlu menjalankan tindakan proaktif dalam mengelola kerentanan, diawali dengan identifikasi kerentanan, prioritisasi, penanganan, verifikasi dan evaluasi. Sehingga dapat meminimalisasi risiko kerentanan tersebut dieskploitasi oleh pihak yang t…

Edition
-
ISBN/ISSN
9786231075413
Collation
xix, 154 hal: 24 cm
Series Title
-
Call Number
005.8 TAU k
Availability3
Add to basket
MARC DownloadCite
cover
Cyber Security and Operations Management for Industry 4. 0
Comment Share
Elngar, Ahmed A.;;Elhoseny, Mohamed;Sagayam, K. MartinThillaiarasu, N.

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …

Edition
-
ISBN/ISSN
9781000807271
Collation
xvi, 146 hal : 23cm
Series Title
-
Call Number
658.478 ELN c
Availability1
Add to basket
MARC DownloadCite
cover
Real world cryptography
Comment Share
Wong, David

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best pract…

Edition
-
ISBN/ISSN
9781638350842
Collation
xxv, 370 hlm :23 cm
Series Title
--
Call Number
005.82 WON r
Availability2
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?