Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 156 from your keywords: subject="security measures"
1 2 3 4 5 Next Last Page
cover
Performance modeling and analysis of bluetooth networks
Comment Share
Misic, JelenaMisic, Vojislav B.

Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages and disadvantages of performance solutions. Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, …

Edition
-
ISBN/ISSN
9780849331572
Collation
336 hlm.; ilus.; 23 cm
Series Title
-
Call Number
004.62 MIS p
Availability2
Add to basket
MARC DownloadCite
cover
Computer Network Security Theory and Practice
Comment Share
Jie Wang

Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT profession…

Edition
1038 running number
ISBN/ISSN
9787040241624
Collation
xviii, 384 p. : ill. ; 25 cm.
Series Title
-
Call Number
005.8 WAN c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and Network Security
Comment Share
Behrouz A. Forouzan

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c

Edition
-
ISBN/ISSN
9780073327532
Collation
xxvi, 721 p. : ill. ; 24 cm.
Series Title
-
Call Number
005.8 FOR c
Availability1
Add to basket
MARC DownloadCite
cover
Cyber Security Education : Principles and Policies
Comment Share
Austin, Greg

"This book investigates the goals and policy aspects of cyber-security education in the light of escalating technical, social and geopolitical challenges. The past ten years has seen a tectonic shift in the social and political significance of cyber-security education. Once the preserve of small groups of dedicated educators and industrial professionals, the subject is now on the frontlines of …

Edition
-
ISBN/ISSN
9780367822576
Collation
xx, 225 hal : 23cm
Series Title
-
Call Number
005.8071
Availability1
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Schneier on Security
Comment Share
Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machin…

Edition
-
ISBN/ISSN
9780470395356
Collation
328hal
Series Title
-
Call Number
005.80973 SCH s
Availability2
Add to basket
MARC DownloadCite
cover
Security and privacy in communication networks : 5th International ICST Confe…
Comment Share
Chen, YanDimitriou, Tassos D.Zhou, JianyingZhou, Jianying.

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and p…

Edition
--
ISBN/ISSN
9783642052835
Collation
xiii, 460 hlm.; ilus.; 24 cm
Series Title
5th ICST conference
Call Number
005.8 CHE s
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27005 -- Information technology -- security techniques -- information…
Comment Share
ISO/IEC

Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…

Edition
Third edition
ISBN/ISSN
--
Collation
vi, 53 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27000 -- Information technology -- security techniques -- Information…
Comment Share
ISO/IEC

Contents Page Foreword Introduction 1 Scope 2 Normative references 3 Terms anda definitions 4 Information security management systems 4.1 General 4.2 What is an ISMS? 4.3 Process approach 4.4 Why an ISMS is important 4.5 Establishing, monitoring, maintaining and improving an ISMS 4.6 ISMS critical success factors 4.7 benefits of the ISMS family of standards 5. ISMS family of …

Edition
Fifth edition
ISBN/ISSN
--
Collation
v, 27 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
cover
ISO/IEC 27033 -- Information technology -- security techniques -- network sec…
Comment Share
ISO/IEC

Contents: Foreword Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms 5 Structure 6 Overview 7 Security threats 7.1 General 7.2 Unauthorized access 7.3 Packet sniffing 7.4 Rogue wireless access point 7.5 Denial of service attack 7.6 Bluejacking 7.7 Bluesnarfing 7.8 Adhoc networks 7.9 Other threats 8 Security requirements 8…

Edition
First edition
ISBN/ISSN
--
Collation
vii, 26 hlm.; ilus.; 30 cm
Series Title
--
Call Number
R005.8 ISO i
Availability1
Add to basket
MARC DownloadCite
1 2 3 4 5 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?