Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 11 from your keywords: subject="Wireless communicatio...
1 2 Next Last Page
cover
Wireless public safety networks 3
Comment Share
Daniel Camara,Navid Nikaein

Public Warning Applications : Requirements and Examples / Javier Mulero Chaves and Tomaso De Cola -- An Innovative and Economic Management of Earthquakes : Early Warnings and Situational Awareness in Real Time / Oscar Marcelo Zambrano, Ana Maria Zambrano, Manuel Esteve and Carlos Palau -- Community Early Warning Systems / Ana Maria Zambrano, Xavier Calderón, Sebastian Jaramillo, Oscar Marcelo…

Edition
-
ISBN/ISSN
9781785480539
Collation
xiii, 252 hal : illus ; 24 cm.
Series Title
-
Call Number
621.384 CAM w
Availability1
Add to basket
MARC DownloadCite
cover
Analisis Formal Protokol MPKE pada Wireless Mesh Network Menggunakan ProVerif
Comment Share
Sri RosdianaYeni FaridaNia YuliantiTsamara Khadijah Silim

Protokol MPKE pada Wireless Mesh Network (WMN) merupakan protokol banyak pihak yang menggunakan tiket dalam proses autentikasi. Protokol MPKE dibuat oleh Roy et al. pada tahun 2022 yang ditujukan untuk proses autentikasi pada saat handover dari Home Mesh Access Point (HMAP) ke Foreign Mesh Access Point (FMAP). Protokol ini dapat diterapkan pada perangkat yang terhubung ke dalam suatu jaringan r…

Edition
-
ISBN/ISSN
--
Collation
xvi, 65 hal
Series Title
-
Call Number
2024 TSA a
Availability2
Add to basket
MARC DownloadCite
cover
Security and privacy in communication networks : 5th International ICST Confe…
Comment Share
Chen, YanDimitriou, Tassos D.Zhou, JianyingZhou, Jianying.

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and p…

Edition
--
ISBN/ISSN
9783642052835
Collation
xiii, 460 hlm.; ilus.; 24 cm
Series Title
5th ICST conference
Call Number
005.8 CHE s
Availability1
Add to basket
MARC DownloadCite
cover
Wireless communications under hostile jamming: security and efficiency
Comment Share
Li, TongtongSong, TianlongLiang, Yuan

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. Table of contents Part I Wireless Technology and Communications—Explorat…

Edition
-
ISBN/ISSN
9789811308208
Collation
xxi, 219 hlm; 23,5 cm
Series Title
--
Call Number
004.66 LI w
Availability2
Add to basket
MARC DownloadCite
cover
Honeypots: a new paradigm to information security
Comment Share
Joshi, R. CSardana, Anjali

Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics

Edition
--
ISBN/ISSN
9781578087082
Collation
xiv, 328 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 JOS h
Availability1
Add to basket
MARC DownloadCite
cover
Wireless reconnaissance in penetration testing
Comment Share
Neely, MatthewHamerstone, AlexSanyk, Chris

Contents: 1. Why radio profiling 2. Basic radio theory and introduction to radio systems 3. Targets 4. Offsite profiling 5. Onsite radio profiling 6. How to use the information you gather 7. Basic overview of equipment and how it works 8. The house dosn't always win: a wireless reconnaissance case study 9. New technology

Edition
1st edition
ISBN/ISSN
9781597497312
Collation
xvi, 166 hal.; illus.; 24 cm
Series Title
--
Call Number
621.389 NEE w
Availability1
Add to basket
MARC DownloadCite
cover
Build your own security lab: a field guide for network testing
Comment Share
Gregg, Michael

Table of Contents 1. Hardware And Gear 1.1. Why Build a Lab? 1.2. Hackers Welcome 1.3. The Essential Gear 1.4. Obtaining Requisite Hardware/Software 1.5. Assembling the Network Lab 2. Building a Software Test Platform 2.1. Server OS Installations 2.2. Virtualization 2.3. Client-Side Tools 2.4. Learning …

Edition
1st edition
ISBN/ISSN
9780470179864
Collation
xxvi, 428 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 GRE b
Availability1
Add to basket
MARC DownloadCite
cover
Wireless and mobile device security
Comment Share
Doherty, Jim

Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…

Edition
--
ISBN/ISSN
9781284059274
Collation
xx, 392 hal.; ilus.; 23 cm
Series Title
--
Call Number
005.8 DOH w
Availability1
Add to basket
MARC DownloadCite
cover
CWSP certified wireless security professional study guide
Comment Share
Coleman, David D.Westcott, David AHarkins, Bryan

Table of contents: Chapter 1 WLAN Security Overview 1 Chapter 2 Legacy 802.11 Security 29 Chapter 3 Encryption Ciphers and Methods 61 Chapter 4 802.1X/EAP Authentication 87 Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151 Chapter 6 PSK Authentication 193 Chapter 7 802.11 Fast Secure Roaming 215 Chapter 8 WLAN Security Infrastructure 257 Chapter 9 RADIUS and LDAP 291 Chap…

Edition
Second Edition
ISBN/ISSN
9781119211082
Collation
xlvii, 645 hal.; ilus.; 24 cm
Series Title
--
Call Number
005.8 COL c
Availability1
Add to basket
MARC DownloadCite
cover
Multi-Mode/Multi-Band RF Transceiver for Wireless Communications: advanced te…
Comment Share
Hueber, GernotStaszewski, Robert Bodan

Terdapat indeks. 1. Machine generated contents note: I.Transceiver Concepts and Design 2. Software-Defined Transceivers 3. Adaptive Multi-Mode RF Front-End Circuits 4. Precise Delay Alignment Between Amplitude and Phase 5. Overview of Front-End RF Passive Integration into SoCs 6. ADCs and DACs for Software-Defined Radio 7. OFDM Transform-Domain Receivers for Multi-Standard Communic…

Edition
null
ISBN/ISSN
97880470277119
Collation
xiii, 594 hlm.: ilus.; 25 cm.
Series Title
null
Call Number
004.6 HUE m
Availability0
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?