Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 476 from your keywords: subject="Security"
1 2 3 4 5 Next Last Page
cover
Revolution in data science, ai & cybersecurity in connected word
Comment Share
Rudi Rusdiah

ABDI mengundang penulis dan pakar dari dalam dan luar negeri yang peduli terhadap kemajuan ilmu pengetahuan dan tingginya adaptasi dan adoptasi teknologi Industri 4.0 di Indonesia oleh Masyarakat Indonesia. Presiden Jokowi juga menekankan pentingnya penguasaan teknologi Al, Data Science, Cyber Security hingga Metaverse, oleh bangsa Indonesia, karena perubahan semakin masif, cepat dan perubahan …

Edition
-
ISBN/ISSN
9786239267254
Collation
180 hal : 24 cm
Series Title
-
Call Number
005.8 RUD r
Availability2
Add to basket
MARC DownloadCite
cover
Primality testing and integer factorization in public-key cryptography
Comment Share
Song Y. Yan.

Primality Testing and Integer Factorization in Public-Key Cryptography introduces various algorithms for primality testing and integer factorization, with their applications in public-key cryptography and information security. More specifically, this book explores basic concepts and results in number theory in Chapter 1. Chapter 2 discusses various algorithms for primality testing and prime num…

Edition
first edition
ISBN/ISSN
9781402076497
Collation
xvi, 236 hal : ilus. ; 25 cm.
Series Title
-
Call Number
005.82 YAN p
Availability1
Add to basket
MARC DownloadCite
cover
Bluetooth security
Comment Share
Christian Gehrmann,Joakim PerssonBen Smeets.

Edition
first edition
ISBN/ISSN
9781580535045
Collation
xii, 204 hal. : ilus. ; 24 cm.
Series Title
computer security series
Call Number
005.8 GEH b

Edition
first edition
ISBN/ISSN
9781580535045
Collation
xii, 204 hal. : ilus. ; 24 cm.
Series Title
computer security series
Call Number
005.8 GEH b
Availability1
Add to basket
MARC DownloadCite
cover
The executive guide to information security : threats, challenges, and solutions
Comment Share
Mark Egan

Edition
1
ISBN/ISSN
9780321304513
Collation
xix, 268 hal. : ilus ; 24 cm.
Series Title
-
Call Number
005.8 EGA e

Edition
1
ISBN/ISSN
9780321304513
Collation
xix, 268 hal. : ilus ; 24 cm.
Series Title
-
Call Number
005.8 EGA e
Availability1
Add to basket
MARC DownloadCite
cover
Pedoman Umum Cyber security framework sektor pemerintah
Comment Share
Badan Siber dan Sandi Negara

Bentuk pedoman Umum Cyber security framework sektor pemerintah 1. Domain tatakelola 2. Domain Teknologi dan operasional 3. Domain sumber daya manusia 4 Domain keberlanjutan organisasi dan pengelolaan krisis 5. Domain Kepatuhan

Edition
-
ISBN/ISSN
--
Collation
300 hal ; 30 cm
Series Title
-
Call Number
R005.82 BAD p
Availability1
Add to basket
MARC DownloadCite
cover
Network:tweaking dan hacking: trik menjelajahi jaringan yang jarang diungkapkan
Comment Share
Efvy Zam

Daftar isi: Bab 1 Otak-atik jaringan dengan command prompt Bab 2 Menjelajah jaringan Bab 3 Otak-atik jaringan wireless Bab 4 Mencari sinyal kuat jaringan wireless Bab 5 Memutuskan koneksi internet komputer lain Bab 6 Menembus blokir internet dengan duplikasi MAC address Bab 7 Membuka jaringan wireless yang tersembunyi Bab 8 Mendeteksi spoofing Bab 9 Mengontrol bandwidth dan …

Edition
-
ISBN/ISSN
9786020497082
Collation
ix, 204 hal.; ilus.; 21 cm
Series Title
--
Call Number
005.84 EFV n
Availability5
Add to basket
MARC DownloadCite
cover
Bluetooth end to end
Comment Share
Diane McMichael GilsterD.M. Bakker a

Bluetooth End to End is a comprehensive look at the technology from the standpoint of the IT Professional. The book goes above and beyond a simple re-hashing of the specification to provide practical implementation information on Bluetooth technology application fundamentals, implementation, wireless networking, Bluetooth security considerations, chip technology and the required specifications …

Edition
first edition
ISBN/ISSN
9780764548871
Collation
xxiii, 309 hal : ilus. ; 24 cm.
Series Title
-
Call Number
621.39 BAK b
Availability1
Add to basket
MARC DownloadCite
cover
Ethical hacking with kali linux: learn fast how to hack line a pro
Comment Share
Hugo Hoffman

The contents in this book will provide practical hands on implementation and demonstration guide on how you can use Kali Linux to deploy various attacks on both wired and wireless networks. If you are truly interested in becoming an Ethical Hacker or Penetration Tester, this book is for you.NOTE: If you attempt to use any of this tools on a wired or wireless network without being authorized and…

Edition
1
ISBN/ISSN
9798636485780
Collation
152 hal : :ilus: 24cm
Series Title
-
Call Number
005.8 HOF e
Availability1
Add to basket
MARC DownloadCite
cover
Understanding cryptography : a textbook for students and practitioners
Comment Share
Paar, ChristofCraig, Allen T.McKean, Joseph W.Pelzl, Jan

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…

Edition
first
ISBN/ISSN
9783642041006
Collation
xviii, 372 p. : ill. ; 24 cm
Series Title
null
Call Number
005.82 PAA u
Availability2
Add to basket
MARC DownloadCite
cover
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Comment Share
Jack Koziol,Chris AnleyDavid Litchfield,

Description Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating sy…

Edition
1
ISBN/ISSN
9780764544682
Collation
xxiii, 620 p. : ill. ; 24 cm.
Series Title
-
Call Number
0058 KOZ s
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?