Kementerian Pendidikan Dasar dan Menengah

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
    To
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 51 from your keywords: subject="networks"
# Debug Box
/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [
  "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode)))"
  "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode))) order by sb.last_update desc limit 10 offset 40"
]
Bind Value ⚒️: array:1 [
  ":subject" => "'+\"networks\"'"
]
First Page Previous 1 2 3 4 5 Next Last Page
cover
The InfoSec handbook : an introduction to information security
Nayak, UmeshaRao, Umesh Hodeghatta

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…

Edition
-
ISBN/ISSN
9781430263838
Collation
xxiv, 392p. : ill.
Series Title
-
Call Number
005.82 NAY i
Availability0
Items not available
MARC DownloadCite
cover
A practical guide to TPM 2.0 : using the Trusted Platform Module in the new a…
Arthur, WillChallener, David

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
-
ISBN/ISSN
9781430265849
Collation
xxvii, 392p. : ill.
Series Title
-
Call Number
005.82 ART p
Availability0
Items not available
MARC DownloadCite
cover
Managing risk and information security : protect to enable
Harkins, Malcolm W.

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…

Edition
second edition
ISBN/ISSN
9781484214558
Collation
xxvii, 187p. : ill.
Series Title
-
Call Number
005.8 HAR m
Availability0
Items not available
MARC DownloadCite
cover
Demystifying Internet of Things security : successful IoT device/edge and pla…
Cheruvu, SunilKumar, AnilSmith, NedWheeler, David M.

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…

Edition
-
ISBN/ISSN
9781484228968
Collation
xxx, 488p. : ill.
Series Title
-
Call Number
005.8 DEM d
Availability0
Items not available
MARC DownloadCite
cover
The ethics of cybersecurity
Christen, MarkusGordijn, BertLoi, Michele

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values l…

Edition
-
ISBN/ISSN
9783030290535
Collation
xvii, 384p. : ill.
Series Title
-
Call Number
005.8 ETH e
Availability0
Items not available
MARC DownloadCite
cover
Online hate and harmful content : cross-national perspectives
Keipi, TeoNäsi, MattiOksanen, AtteRäsänen, Pekka

Over the past few decades, various types of hate material have caused increasing concern. Today, the scope of hate is wider than ever, as easy and often-anonymous access to an enormous amount of online content has opened the Internet up to both use and abuse. By providing possibilities for inexpensive and instantaneous access without ties to geographic location or a user identification system, …

Edition
-
ISBN/ISSN
9781315628370
Collation
x, 143p. : ill.
Series Title
-
Call Number
302.3 ONL o
Availability0
Items not available
MARC DownloadCite
cover
Social networks with rich edge semantics
Zheng, QuanSkillicorn, David

Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the …

Edition
-
ISBN/ISSN
9781315390628
Collation
xx, 210p. : ill.
Series Title
-
Call Number
302.3015118 ZHE s
Availability0
Items not available
MARC DownloadCite
cover
Rhetorical code studies : discovering arguments in and around code
Brock, Kevin

Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which softw…

Edition
-
ISBN/ISSN
9780472131273
Collation
xvii, 213p. : ill.
Series Title
-
Call Number
005.13 BRO r
Availability0
Items not available
MARC DownloadCite
cover
#Identity : hashtagging race, gender, sexuality, and nation
De Kosnik, AbigailFeldman, Keith P.

"Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have been used to bully and …

Edition
-
ISBN/ISSN
9780472074150
Collation
xi, 365p. : ill.
Series Title
-
Call Number
302.30285 HAS h
Availability0
Items not available
MARC DownloadCite
cover
Playful mapping in the digital age
Wilmott , ClancyPerkins, ChrisLammes, SybilleHind, Sam

From Mah-Jong, to the introduction of Prussian war-games, through to the emergence of location-based play: maps and play share a long and diverse history. This monograph shows how mapping and playing unfold in the digital age, when the relations between these apparently separate tropes are increasingly woven together. Fluid networks of interaction have encouraged a proliferation of hybrid forms…

Edition
-
ISBN/ISSN
9789492302137
Collation
156 p.
Series Title
Theory on Demand
Call Number
006 PLA p
Availability0
Items not available
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
Kementerian Pendidikan Dasar dan Menengah
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2026 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search