Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 9 from your keywords: subject="Computers Security"
cover
Cryptography in the information society
Comment Share
Ryabko, BorisFionov, Andrey

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain a…

Edition
-
ISBN/ISSN
9789811226168
Collation
2xii, 272 hlm : 23cm
Series Title
--
Call Number
005.82 RYA c
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in MATLAB: creating and programming advanced a…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing …

Edition
-
ISBN/ISSN
9781484273340
Collation
xiii, 194 hal : 23 cm
Series Title
--
Call Number
652.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi Indicator of Compromise OTX AlienVault pada MISP Threat Sharing …
Comment Share
Nanang TriantoIra Rosianal HikmahTiyas YulitaDimas Wahyu Utomo

Dalam era siber yang terus berkembang, ancaman serangan siber semakin beragam dan sulit dipahami. Informasi yang tepat dan lengkap terkait serangan siber dapat dimanfaatkan untuk dapat membuat sistem keamanan jaringan yang handal dan mampu beradaptasi secara otomatis, sehingga jaringan lebih terlindungi dari ancaman di masa depan. Berdasarkan Lanskap Keamanan Badan Siber dan Sandi Negara pada t…

Edition
-
ISBN/ISSN
--
Collation
xv, 43 hal
Series Title
-
Call Number
2024 DIM i
Availability2
Add to basket
MARC DownloadCite
cover
Trik seo dan security codeigniter
Comment Share
Anhar

Pembahasan dalam buku ini diawali dengan pengenalan framework, kemudian dilanjutkan dengan pembuatan website menggunakan Codeigniter dan security codeigniter. Terakhir disertakan pembahasan trik optimalisasi website (domain name, content website, cara memperkenalkan website, blackhat SEO, website pinger, link builder, trafik kunjungan dan cara menggunakan tool-tool SEO. Daftar Isi: BAB 1 . …

Edition
Cet. I
ISBN/ISSN
9786026231147
Collation
viii, 104 hlm.; ilus.; 21 cm
Series Title
--
Call Number
005.8 ANH t
Availability1
Add to basket
MARC DownloadCite
cover
Design and analysis of security protocol for communication
Comment Share
Goyal, DineshBalamurungan, SLung Peng, ShengVerma, O. P.

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols.…

Edition
-
ISBN/ISSN
9781119555643
Collation
xvi, 351 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 GOY d
Availability1
Add to basket
MARC DownloadCite
cover
Practical Internet of things security: design a security framework for an int…
Comment Share
Russell, BrianVan Duren, Drew

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implem…

Edition
2nd edition
ISBN/ISSN
9781788622844
Collation
374 hlm
Series Title
--
Call Number
005.8 RUS p
Availability1
Add to basket
MARC DownloadCite
cover
Pro cryptography and cryptanalysis with C++20: creating and programming advan…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…

Edition
-
ISBN/ISSN
9781484265864
Collation
478 hlm
Series Title
--
Call Number
652.8 MAR p
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?