Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 64 from your keywords: subject="Software"
1 2 3 4 5 Next Last Page
cover
Logging and log management: the authoritative guide to understanding the conc…
Comment Share
Phillips, ChristopherChuvakin, AntonSchmidt, Kevin J.Moulder, Patricia

Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…

Edition
--
ISBN/ISSN
9781597496353
Collation
xxx, 431 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.1 CHU l
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi DevSecOps dengan Mengintegrasikan Code Obfuscation dalam Continu…
Comment Share
Hermawan SetiawanHerman KabettaI Komang Setia BuanaAngelita Salsabila Afifah

Edition
-
ISBN/ISSN
--
Collation
xv, 50 hal
Series Title
-
Call Number
2024 ANG i

Edition
-
ISBN/ISSN
--
Collation
xv, 50 hal
Series Title
-
Call Number
2024 ANG i
Availability2
Add to basket
MARC DownloadCite
cover
Cryptographic Libraries for Developers
Comment Share
Ed MoyleDiana Kelley

Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familia…

Edition
-
ISBN/ISSN
9781584504092
Collation
-
Series Title
programing series
Call Number
005.1 MOY c
Availability1
Add to basket
MARC DownloadCite
cover
Analisis komparatif keamanan aplikasi berbasis sistem operasi android berdasa…
Comment Share
AmiruddinDimas Febriyan PriambodoRay Novita YasaAldi Cahya Fajar Nugraha

Abstrak: Pengguna internet di Indonesia terus mengalami peningkatan. Peningkatan tersebut sejalan dengan berkembangnya teknologi smartphone Android yang mulai menggantikan telepon seluler terdahulu. Meskipun demikian, banyak pengguna smartphone Android masih belum siap menghadapi perubahan ini. Hal ini ditandai dengan rendahnya tingkat kesadaran pengguna smartphone Android di Indonesia terhad…

Edition
--
ISBN/ISSN
--
Collation
xvi, 182 halaman
Series Title
--
Call Number
2023 ALD a
Availability2
Add to basket
MARC DownloadCite
cover
Belajar otodidak flask: framework python untuk pengembangan aplikasi web
Comment Share
Budi Raharjo

Daftar Isi: Bab 1. Pengenalan Flask Apa Itu. WSGI? Pustaka Werkzeug Lingkungan Pengembangan Virtual Instalasi Flask di dalam Lingkungan Virtual Arsitektur Aplikasi dalam Flask Membuat Aplikasi dalam Flask Mengenal Objek request Python dan Flask Bagi Pengguna Windows Bab 2. Model, Fungsi View, dan Konfigurasi Aplikasi Bekerja dengan Model Bekerja dengan Fungsi View Konfigurasi Apl…

Edition
Cet. 1
ISBN/ISSN
9786026232267
Collation
xii, 243 hal.; ilus.; 24 cm + 1 CD
Series Title
--
Call Number
005.262 BUD b
Availability3
Add to basket
MARC DownloadCite
cover
Reinventing ITIL® in the age of devOps: innovative techniques to make proces…
Comment Share
Kaiser, Abhinav Krishna

Table of Content 1. Introduction to DevOps 2. ITIL Basics 3. ITIL and DevOps: An Analysis 4. Integration: Alignment of Processes 5. Teams and Structures 6. Managing Configurations in a DevOps Project 7. Incident Management Adaption 8. Problem Management Adaption 9. Managing Changes in a DevOps Project 10. Release Management in DevOps

Edition
-
ISBN/ISSN
9781484239759
Collation
xviii, 306 hlm.; ilus.; 25,5 cm
Series Title
--
Call Number
658.4038 KAI r
Availability1
Add to basket
MARC DownloadCite
cover
Trik kolaborasi framework codeigniter & smarty PHP
Comment Share
Anita Sesar Ria

Daftar isi: Bab 1. Pengenalan Dasar Codeigniter Bab 2. Let's Play The Codeigniter Bab 3. Smarty PHP The Top PHP Template Engine Bab 4. Let's Play The Smarty PHP Bab 5. Kolaborasi Codeigniter dan Samrty PHP Bab 6. Trik Aplikasi Kolaborasi Codeigniter dan Smarty PHP Bab 7. Bonus Project: Aplikasi Pembayaran SPP pada SMK Ansera Tunas Cendikia

Edition
-
ISBN/ISSN
9786237156055
Collation
x, 112 hlm.; 21 cm
Series Title
-
Call Number
005.262 ANI t
Availability1
Add to basket
MARC DownloadCite
cover
Rancang bangun model Honeypot-as-a-Service menggunakan Kubernetes Cluster
Comment Share
AmiruddinRahmat PurwokoHerman KabettaGhiffari Adhe Permana

Salah satu mekanisme dalam menjaga jaringan dari serangan siber adalah dengan menggunakan honeypot. Penggunaan honeypot bertujuan untuk mengelabui penyerang untuk melakukan serangan ke dalam honeypot, bukan kepada perangkat pada jaringan. Pada tingkat organisasi atau individu penggunaan honeypot masih jarang ditemukan. Karena pada implementasinya, dibutuhkan tenaga ahli dan infrastruktur khusus…

Edition
--
ISBN/ISSN
--
Collation
xvii, 64 hlm.
Series Title
-
Call Number
2022 GHI r
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi password stealing attack terhadap saved password pada browser ko…
Comment Share
Setiyo CahyonoObrina Candra BriliyantIra Rosianal HikmahFarid Akram

Password merupakan metode autentikasi yang paling umum digunakan. Namun, terdapat permasalahan dalam penggunaannya, pengguna harus mengingat password miliknya secara terus-menerus. Solusi dari permasalahan tersebut yaitu dengan menggunakan password manager. Saat ini, sudah terdapat password manager yang terintegrasi dengan browser komputer. Namun, sayangnya keamanan pada password manager terseb…

Edition
--
ISBN/ISSN
--
Collation
xv, 67 hlm.
Series Title
-
Call Number
2022 FAR i
Availability2
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?