Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 154 from your keywords: subject="Science"
1 2 3 4 5 Next Last Page
cover
Pseudorandomness and cryptographic applications
Comment Share
Michael Luby.

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that “looks” just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functi…

Edition
-
ISBN/ISSN
9780691025469
Collation
xvi, 234 hal : 23 cm
Series Title
-
Call Number
005.82 LUB p
Availability2
Add to basket
MARC DownloadCite
cover
Pengantar struktur data
Comment Share
Suryadi

Daftar isi: BAB 1 Penyajian data sederhana dan struktur data 1.1 Data dan struktur data 1.2 Type data sederhana 1.3 Deklarasi data dalam Bahasa pemrograman 1.4 Pemetaan (mapping) ke storage: integer 1.5 Pemetaan ke storage: karakter dan string 1.6 Sekilas macam struktur data 1.7 Organisasi logic dan fisik dari struktur data 1.8 Waktu pelaksanaan program sebagai fungsi ukuran data in…

Edition
Edisi pertama
ISBN/ISSN
9798382056
Collation
vi, 208 hlm.; ilus.; 24 cm
Series Title
--
Call Number
005.73 SUR p
Availability1
Add to basket
MARC DownloadCite
cover
Java untuk kriptografi
Comment Share
Sianipar, R.H.

Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…

Edition
Ed. I
ISBN/ISSN
9789792958836
Collation
vi, 218 hal.; ilus.; 23 cm + 1 CD
Series Title
--
Call Number
005.82 SIA j
Availability9
Add to basket
MARC DownloadCite
cover
Prosiding- constructive side-channel analysis and secure design: 13th interna…
Comment Share
O'flynn, ColinBalasch, Josep

his book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation …

Edition
-
ISBN/ISSN
9783030997663
Collation
279 hlm
Series Title
Lecture Notes in Computer Science Series
Call Number
PROS BAL p
Availability2
Add to basket
MARC DownloadCite
cover
Modern cryptography for cybersecurity professionals: learn how you can levera…
Comment Share
Bock, Lisa

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encryption and learn how a hash is used* Get to grips with different types of cryptographic solutions al…

Edition
-
ISBN/ISSN
9781838647797
Collation
xiii, 269 hal : 23cm
Series Title
--
Call Number
005.82 Boc m
Availability2
Add to basket
MARC DownloadCite
cover
Security Incidents and Response Against Cyber Attacks
Comment Share
Bhardwaj, AkashdeepSapra, Varun

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to addres…

Edition
-
ISBN/ISSN
9783030691745
Collation
xiv, 246 hal : 23cm
Series Title
-
Call Number
005.8 BHA s
Availability1
Add to basket
MARC DownloadCite
cover
Secure Data Science : Integrating Cyber Security and Data Science
Comment Share
Thuraisingham, Bhavani MKantarcioglu, Murat;Khan, LatifurKantarcioglu, Murat

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied …

Edition
-
ISBN/ISSN
9781000557510
Collation
xix, 435 hal :23 cm
Series Title
-
Call Number
005.8 THU s
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security: Issues and Current Trends
Comment Share
Dutta, NitulSudeep;Sarma,Hiren Kumar Deva;Pricop,Emil

This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introdu…

Edition
-
ISBN/ISSN
9789811665974
Collation
xii, 174 hal : 23 cm
Series Title
-
Call Number
005.82 DUT c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and cryptanalysis in java: creating and programming advanced alg…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptograph…

Edition
-
ISBN/ISSN
9781484281055
Collation
x, 227 hal :23 cm
Series Title
--
Call Number
005.82 STE c
Availability2
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?