Kementerian Pendidikan Dasar dan Menengah

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
    To
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 62 from your keywords: subject="Security"
# Debug Box
/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [
  "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode)))"
  "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode))) order by sb.last_update desc limit 10 offset 50"
]
Bind Value ⚒️: array:1 [
  ":subject" => "'+\"Security\"'"
]
First Page Previous 6 7 Next Last Page
cover
Security infrastructure technology for integrated utilization of big data : a…
Miyaji, AtsukoMimoto, Tomoaki

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and pri…

Edition
-
ISBN/ISSN
9789811536540
Collation
ix, 166p. : ill.
Series Title
-
Call Number
005.8 SEC s
Availability0
Items not available
MARC DownloadCite
cover
Human and organisational factors : practices and strategies for a changing world
Bieder, CorinneGilbert, ClaudeJourné, BenoîtLaroche, Hervé

This open access book addresses several questions regarding the implementation of human and organisational factors (HOF) so that recent improvements in industrial safety can be built upon. It addresses sources of frustration in senior management with high expectations of operational recommendations and disquiet on the part of HOF specialists struggling to have an impact on high-level decision m…

Edition
-
ISBN/ISSN
9783030256395
Collation
viii, 138p. : ill.
Series Title
-
Call Number
620.86 HUM h
Availability0
Items not available
MARC DownloadCite
cover
New direction in strategic thinking 2.0
Glen, Rusell W

"The Australian National University’s Strategic & Defence Studies Centre (SDSC) is Australia’s premier university-based strategic studies think tank. Fifty years after the Centre was founded in 1966, SDSC celebrated its continued research, publications, teaching and government advisory role with a two-day conference entitled ‘New Directions in Strategic Thinking 2.0’. The event saw the …

Edition
-
ISBN/ISSN
9781760462222
Collation
xxv, 237p.: ill.
Series Title
-
Call Number
355.343 NEW n
Availability0
Items not available
MARC DownloadCite
cover
Intel trusted execution technology for server platforms : a guide to more sec…
Futral, WilliamGreene, James

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy t…

Edition
-
ISBN/ISSN
9781430261490
Collation
xvii, 156p. : ill.
Series Title
-
Call Number
005.8 FUT i
Availability0
Items not available
MARC DownloadCite
cover
The privacy engineer's manifesto : getting from policy to code to QA to value
Dennedy, MichelleFox, JonathanFinneran, Tom

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…

Edition
-
ISBN/ISSN
9781430263562
Collation
xxxvi, 400p. : ill.
Series Title
-
Call Number
005.8 DEN p
Availability0
Items not available
MARC DownloadCite
cover
Building the infrastructure for cloud security
Yeluri, RaghuramCastroLeon, Enrique

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here …

Edition
-
ISBN/ISSN
9781430261469
Collation
xxvi, 244p. : ill.
Series Title
-
Call Number
004.6782 YEL b
Availability0
Items not available
MARC DownloadCite
cover
Platform embedded security technology revealed : safeguarding the future of c…
Ruan, Xiaoyu

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secu…

Edition
-
ISBN/ISSN
9781430265726
Collation
xx, 272p. : ill.
Series Title
-
Call Number
005.8 RUA p
Availability0
Items not available
MARC DownloadCite
cover
The InfoSec handbook : an introduction to information security
Nayak, UmeshaRao, Umesh Hodeghatta

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…

Edition
-
ISBN/ISSN
9781430263838
Collation
xxiv, 392p. : ill.
Series Title
-
Call Number
005.82 NAY i
Availability0
Items not available
MARC DownloadCite
cover
A practical guide to TPM 2.0 : using the Trusted Platform Module in the new a…
Arthur, WillChallener, David

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
-
ISBN/ISSN
9781430265849
Collation
xxvii, 392p. : ill.
Series Title
-
Call Number
005.82 ART p
Availability0
Items not available
MARC DownloadCite
cover
Managing risk and information security : protect to enable
Harkins, Malcolm W.

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…

Edition
second edition
ISBN/ISSN
9781484214558
Collation
xxvii, 187p. : ill.
Series Title
-
Call Number
005.8 HAR m
Availability0
Items not available
MARC DownloadCite
First Page Previous 6 7 Next Last Page
Kementerian Pendidikan Dasar dan Menengah
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2026 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search