Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 12 from your keywords: subject="Keamanan komputer"
1 2 Next Last Page
cover
Hardware security and trust: design and deployment of integrated circuits in …
Comment Share
Sklavos, NicolasRegazzoni, FrancescoChaves, RicardoDi Natale, Giorgio

"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…

Edition
-
ISBN/ISSN
9783319443188
Collation
254 hlm
Series Title
--
Call Number
005.8 SKL h
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi Sistem Penyimpanan Terdistribusi yang Aman serta Integrasi IPFS …
Comment Share
Dion OgiMohamad SyahralAgus Reza Aristiadi NurwaAlfian Putra Rakhmadani

Sidik jari sebagai data biometrik yang unik telah menjadi metode autentikasi umum karena kemudahannya dan tingkat akurasi yang tinggi dibandingkan dengan metode tradisional. Namun, penggunaannya membawa risiko privasi dan keamanan, terutama dengan penyimpanan data terpusat. Contohnya adalah peretasan yang terjadi pada server cloud milik AccuDoc Solutions, perusahaan pihak ketiga yang digunakan …

Edition
-
ISBN/ISSN
--
Collation
xvii, 92 hal
Series Title
-
Call Number
2024 ALF i
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography engineering: design principles and practical applications
Comment Share
Ferguson, NielsKohno, TadayoshiSchneier, Bruce

The context of Cryptography, introduction of Cryptography, Massage security, block chipper mode, hash fungtions, Message autentications codes, the secure channel, implementaions issuees, key negotiations, generating randomness, primes, diffie-hellman, RSA, introductions cryptography protocols, Key Negitiations, key management, the clock, key servers, the dream of PKI,PKI Relity, PKI practicalit…

Edition
First Edition
ISBN/ISSN
9780470474242
Collation
xxix, 353 hall. : illus. ; 24 cm
Series Title
null
Call Number
005.82 FER c
Availability5
Add to basket
MARC DownloadCite
cover
Keamanan komputer dan internet
Comment Share
Asep Kurniawan

Keamanan komputer merupakan sebuah upaya yang dilakukan untuk mengamankan kinerja dan proses komputer. Penerapan keamanan komputer dalam kehidupan sehari-hari berguna sebagai penjaga sumber daya sistem agar tidak digunakan, modifikasi, interupsi, dan diganggu oleh orang yang tidak berwenang. Buku ini bertujuan untuk memahami konsep keamanan komputer dan internet sehingga mampu mengimplementas…

Edition
Cet. 1
ISBN/ISSN
9786237342892
Collation
xv, 140 hlm.; ilus.; 23 cm
Series Title
--
Call Number
005.8 ASE k
Availability1
Add to basket
MARC DownloadCite
cover
Why? cryptocurrency & blockchain: mata uang kripto dan rantai-blok
Comment Share
Cho, Youngsun

Sinopsis Mata uang kripto hampir tidak dapat diretas. Teknologi baru yang memungkinkan keamanan mata uang kripto yang ketat adalah rantai blok! Ini adalah sistem konseptual baru yang menjamin keamanan karena menyalin data dan menyimpannya di banyak komputer melalui verifikasi banyak orang. Apa yang akan terjadi di masa depan jika teknologi rantai-blok khusus ini dikombinasikan dengan Internet o…

Edition
-
ISBN/ISSN
9786230030109
Collation
158 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.8 CHO w
Availability1
Add to basket
MARC DownloadCite
cover
The basics of IT audit: purposes, processes, and practical information
Comment Share
Gantz, StephenMaske, Steve

Terdapat Index dan Bibliografi Table of Contents: Fundamentals/Key Concepts Auditing in Context Internal Auditing External Auditing Types of Audits IT Audit Components Audit Drivers IT Audit Processes Methodologies & Frameworks Organizations, standards & Certifications Appendices

Edition
--
ISBN/ISSN
9780124171596
Collation
xxvi, 244 hlm.; ilus.; 24 cm
Series Title
--
Call Number
004.0681 GAN b
Availability2
Add to basket
MARC DownloadCite
cover
Computational intelligence and intelligent systems
Comment Share
Cai, ZhihuaKang, ZhuoLi, ZhenhuaLiu, Yong

Edition
-
ISBN/ISSN
9783642049613
Collation
xiii, 484 hlm.; 24 cm.
Series Title
-
Call Number
R006.3 CAI c

Edition
-
ISBN/ISSN
9783642049613
Collation
xiii, 484 hlm.; 24 cm.
Series Title
-
Call Number
R006.3 CAI c
Availability1
Add to basket
MARC DownloadCite
cover
Modern cryptanalysis: techniques for advanced code breaking
Comment Share
Swenson, Cristopher

Catatan: Terdapat Index Table of Contents: Acknowledgments. Introduction. Chapter 1: Simple Ciphers. Chapter 2: Number Theoretical Ciphers. Chapter 3: Factoring and Discrete Algorithms. Chapter 4: Block Ciphers. Chapter 5: General Cryptanalytic Methods. Chapter 6: Linear Cryptanalysis. Chapter 7: Differential Cryptanalysis.

Edition
null
ISBN/ISSN
9780470135938
Collation
xxviii, 236 hlm; ilus; 22 cm
Series Title
--
Call Number
005.82 SWE m
Availability3
Add to basket
MARC DownloadCite
cover
Computer security and cryptography
Comment Share
Konheim, Alan G.

Table of Contents: CHAPTER 1: APERITIFS. 1.1 The Lexicon of Cryptography. 1.2 Cryptographic Systems. 1.3 Cryptanalysis. 1.4 Side Information. 1.5 Thomas Jefferson and the M-94. 1.6 Cryptography and History. 1.7 Cryptography and Computers. 1.8 The National Security Agency. 1.9 The Giants. 1.10 No Sex, Money, Crime or . . . Love. 1.11 An Example of the Inference Process in Cryptanalysis. 1.12 War…

Edition
null
ISBN/ISSN
9780471947837
Collation
xvii, 521 hlm: ilus.; 27 cm
Series Title
--
Call Number
005.8 KON c
Availability4
Add to basket
MARC DownloadCite
cover
Kriptografi : keamanan internet dan jaringan telekomunikasi
Comment Share
Yusuf Kurniawan

Pembaca akan diajak untuk mengenal algoritma kriptografi dari yang primitif sampai yang paling modern dan melihat mengapa suatu algoritma kriptografi dinyatakan aman atau tidak aman secara cukup mendetil. Pembaca akan melihat manfaat kriptografi dalam dunia nyata semacam e-commerce (SSL), pengamanan email (PGP), telepon selular GSM (A5), serta Kerberos sebagai protokol otentikasi pada jaringan …

Edition
null
ISBN/ISSN
9793338164
Collation
x, 316 hlm.: ilus.; 23 cm
Series Title
--
Call Number
005.82 YUS k
Availability4
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?