Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 12 from your keywords: subject="performa"
1 2 Next Last Page
cover
Performance modeling and analysis of bluetooth networks
Comment Share
Misic, JelenaMisic, Vojislav B.

Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages and disadvantages of performance solutions. Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, …

Edition
-
ISBN/ISSN
9780849331572
Collation
336 hlm.; ilus.; 23 cm
Series Title
-
Call Number
004.62 MIS p
Availability2
Add to basket
MARC DownloadCite
cover
Optimasi prototipe perangkat portabel password cracking berbasis Raspberry Pi…
Comment Share
Rahmat PurwokoJeckson SidabutarArizalMuhammad Faiz Syukron

Abstrak: Internet membawa tantangan baru dalam hal keamanan dan privasi, termasuk penggunaan password untuk otentikasi. Masalah yang dihadapi pengguna internet adalah sulitnya mengingat dan mengelola banyak password serta bagi penegak hukum berupa sulitnya akses ke data bukti hukum yang terpassword. Untuk mengatasi hal tersebut, terdapat teknik yang dinamakan password cracking. Pada penelitia…

Edition
--
ISBN/ISSN
--
Collation
xvii, 128 halaman
Series Title
--
Call Number
2023 MUH o
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi dan analisis performa WIDS untuk mendeteksi clogging attack pada…
Comment Share
Muhammad Yusuf Bambang SetiadjiJeckson SidabutarIra Rosianal HikmahMuhammad Zhilal Agrayasa

Penelitian ini bertujuan untuk mengimplementasikan dan melakukan analisis performa Wireless Intrusion Detection System (WIDS) yang dapat mendeteksi Clogging Attack yang meliputi SAE Authentication flood, Beacon flood dan Deauthentication flood pada jaringan WPA3. Tahapan implementasi meliputi instalasi dan konfigurasi ruang lingkup jaringan WPA3 dan WIDS berbasis program python serta …

Edition
--
ISBN/ISSN
--
Collation
xxi, 39 hlm.
Series Title
-
Call Number
2022 MUH i
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi sistem analisis log otomatis untuk melakukan analisis Windows lo…
Comment Share
Nanang TriantoJeckson SidabutarIra Rosianal HikmahI Wayan Ari Marjaya

Pada masa pandemi seperti saat ini, penggunaan layanan Remote Dekstop Protocol (RDP) menjadi semakin banyak selaras dengan meningkatnya ancaman yang dihadapi pengguna. Perlu adanya suatu sistem untuk memantau kegiatan yang menggunakan layanan RDP sehingga menjamin bahwa pengguna yang terhubung dengan komputer perusahaan memang memiliki hak yang sah. Pada penelitian ini akan dilakukan implementa…

Edition
--
ISBN/ISSN
--
Collation
xi, 42 hlm.
Series Title
-
Call Number
2022 I W i
Availability2
Add to basket
MARC DownloadCite
cover
Uji performa dan keamanan penggunaan RunC, Kata Container, dan gVisor pada Ku…
Comment Share
Setiyo CahyonoRahmat PurwokoHerman KabettaArbain Nur Prasetyo

Munculnya teknologi container menjadi solusi bagi pihak pengembang aplikasi dikarenakan kekhawatiran akan aplikasi yang dikembangkan tidak berjalan dengan normal ketika proses deployment dapat teratasi. Terdapat beberapa pilihan low level container runtimes yang dapat digunakan untuk diimplementasikan pada container, yaitu runC, Kata container, dan gVisor. Pembahasan terkait dengan container, t…

Edition
--
ISBN/ISSN
--
Collation
xiv, 43 hlm.
Series Title
-
Call Number
2022 ARB u
Availability2
Add to basket
MARC DownloadCite
cover
Theory of modeling and simulation: discrete event & iterative system computat…
Comment Share
Zeigler, Bernard P.Muzy, AlexandreKofman, Ernesto

Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the in…

Edition
3rd Edition
ISBN/ISSN
9780128133705
Collation
xxiv, 667 hlm.: ilus.; 23 cm
Series Title
-
Call Number
003.3 ZEI t
Availability1
Add to basket
MARC DownloadCite
cover
Implementasi algoritme GIFT sebagai alternatif TLS Cipher Suite pada prototip…
Comment Share
Mohamad SyahralRahmat PurwokoRini Wisnu WardhaniRizqi Setyo Kusprihantanto

GIFT merupakan algoritme lightweight enkripsi dengan karakteristik cepat, ringan, dan konsumsi daya rendah. Pada penelitian ini, dilakukan implementasi GIFT sebagai alternatif TLS cipher suite pada prototipe VPN gateway. Implementasi dilakukan menggunakan aplikasi OpenSSL dan OpenVPN, serta Raspberry Pi 3 Model B+ sebagai perangkat utamanya. Pengujian juga dilakukan terhadap hasil implementasi …

Edition
--
ISBN/ISSN
--
Collation
xv, 79 hlm
Series Title
-
Call Number
2021 RIZ i
Availability2
Add to basket
MARC DownloadCite
cover
Wireshark network analysis: the official wireshark certified network analyst …
Comment Share
Chappell, Laura

Table of Contents Foreword by Gerald Combs, Creator of Wireshark xxi Preface xxii About This Book xxv Who is This Book For? xxv How is This Book Organized? xxvi What Do Those Icons Mean? xxvii What’s Online at www.wiresharkbook.com? xxvii Which Version of Wireshark Did You Use to Write This Book? xxviii How Can I Submit Comments/Change Requests for This Book? xxviii Wiresha…

Edition
Second Edition
ISBN/ISSN
9781893939943
Collation
xxxvi, 938 hal.; ilus.; 25 cm
Series Title
--
Call Number
004.62 CHA w
Availability1
Add to basket
MARC DownloadCite
cover
Manajemen kinerja
Comment Share
Wibowo

DAFTAR ISI: 1. Pendahuluan 2. Manajemen kinerja 3. Perencanaan kinerja 4. Pelaksanaan kinerja 5. Kompetensi 6. Pemberdayaan 7. Kompensasi 8. Pembinaan sumber daya manusia 9. Review kinerja 10. Mengelola produktivitas 11. Mengelola kualitas 12. Kepuasan kerja 13. Pengukuran kinerja 14. Evaluasi kinerja 15. Umpan balik 16. Perbaikan kinerja

Edition
-
ISBN/ISSN
9789797691301
Collation
xxii, 410 hlm.; 21 cm.
Series Title
-
Call Number
658.31 WIB M
Availability1
Add to basket
MARC DownloadCite
cover
An introduction to communication network analysis
Comment Share
Kesidis, George

Summary: This book is a quantitative text, which focuses on the real issues behind serious modeling and analysis of communications networks. The author covers all the necessary mathematics and theory in order for students to understand the tools that optimize computer networks today.Covers both classical (e.g. queueing theory) and modern (e.g. pricing) aspects of networking. Integrates materia…

Edition
-
ISBN/ISSN
9780471371410
Collation
xiv, 232 hlm.; 26 cm.
Series Title
-
Call Number
621.382 KES i
Availability1
Add to basket
MARC DownloadCite
1 2 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?