Kementerian Pendidikan Dasar dan Menengah

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
    To
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 64 from your keywords: subject="Security"
1 2 3 4 5 Next Last Page
cover
Preparing for digital disruption
Schrijvers, ErikPrins, CorienPasschier, Reijer

Edition
1
ISBN/ISSN
9783030778385
Collation
xiv, 74p. : ill.
Series Title
Research for Policy
Call Number
005.8 ERI p

Edition
1
ISBN/ISSN
9783030778385
Collation
xiv, 74p. : ill.
Series Title
Research for Policy
Call Number
005.8 ERI p
Availability0
Items not available
MARC DownloadCite
cover
NL ARMS Netherlands annual review of military studies 2020 : deterrence in th…
Osinga, Frans P. B.Sweijs, Tim

This open access volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies. The use and utility of deterrence in today’s strategic environment is a topi…

Edition
1
ISBN/ISSN
9789462654198
Collation
XXV, 530 p. : ill.
Series Title
NL ARMS
Call Number
355.0217 OSI n
Availability0
Items not available
MARC DownloadCite
cover
Unauthorized access : the crisis in online privacy and security
Sloan, RobertWarner, Richard

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…

Edition
22
ISBN/ISSN
9781138436923
Collation
xxiii, 401 p
Series Title
-
Call Number
323.4302854678 ROB u
Availability0
Items not available
MARC DownloadCite
cover
Between peace and conflict in the East and the West: studies on transformatio…
Mihr, Anja

This open access book features various studies on democratization, transformation, socio-economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and scholars working in the field of human dimension, security, transformation and development in Europe and Asia, particularly in post-soviet and co…

Edition
1
ISBN/ISSN
9783030774899
Collation
x, 297p
Series Title
-
Call Number
341.7 BET b
Availability0
Items not available
MARC DownloadCite
cover
Security in distributed, grid, mobile, and pervasive computing
Xiao, Yang

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in…

Edition
22
ISBN/ISSN
9781407358901
Collation
i, 437 p, ill
Series Title
BAR INTERNATIONAL SERIES 3082
Call Number
005.8 XIA s
Availability0
Items not available
MARC DownloadCite
cover
Information security governance simplified : from the boardroom to the keyboard
Fitzgerald, ToddPeltier, Tom

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadershi…

Edition
-
ISBN/ISSN
9781439811634
Collation
xxvii, 433 p
Series Title
-
Call Number
005.8
Availability0
Items not available
MARC DownloadCite
cover
Cyber security politics : socio-technological transformations and political f…
Wenger, AndreasDunn Cavelty, Myriam

This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual setting…

Edition
-
ISBN/ISSN
9781003110224
Collation
xiv + 272 p
Series Title
-
Call Number
005.8 DUN c
Availability0
Items not available
MARC DownloadCite
cover
The curious country
Dayton, Leigh

By definition scientists are an inquisitive lot. But what are the scientific curiosities and concerns on the minds of Australians? What worries them, baffles them, and sets their curiosity meter to 10 out of 10? To find out, the Office of the Chief Scientist (OCS) took the nation’s intellectual temperature, surveying 1186 Australians: men and women aged 18 to 65, from all education levels and…

Edition
-
ISBN/ISSN
9781925021363
Collation
142 p
Series Title
-
Call Number
303.4830994 DAY c
Availability0
Items not available
MARC DownloadCite
cover
Data spaces design, deployment and future directions
Curry, EdwardScerri SimonTuikka Tuomo

This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures…

Edition
-
ISBN/ISSN
9783030986360
Collation
XX, 357 p
Series Title
-
Call Number
330 CUR d
Availability0
Items not available
MARC DownloadCite
cover
A practical guide to tpm 2.0 : using the trusted platform module in the new a…
Arthur WillChallener DavidGoldman Kenneth

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…

Edition
-
ISBN/ISSN
9781430265849
Collation
XXVII, 392 p
Series Title
-
Call Number
005.82 ART a
Availability0
Items not available
MARC DownloadCite
1 2 3 4 5 Next Last Page
Kementerian Pendidikan Dasar dan Menengah
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Pengelolaan Perpustakaan Kemendikbud dilaksanakan sesuai dengan Standar Nasional Perpustakaan (SNP) Khusus, dimana pada tahun 2017 Perpustakaan Kemendikbud telah mendapatkan Akreditasi A oleh Perpustakaan Nasional RI. Perpustakaan Kemendikbud dikelola secara profesional dengan memanfaatkan teknologi informasi dan komunikasi dalam menunjang pelayanan kepada pemustaka.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search