Perpustakaan Universitas Negeri Jakarta

  • Beranda
  • Informasi
  • Berita
  • Bantuan
  • Pustakawan
  • Area Anggota
  • Pilih Bahasa :
    Bahasa Arab Bahasa Bengal Bahasa Brazil Portugis Bahasa Inggris Bahasa Spanyol Bahasa Jerman Bahasa Indonesia Bahasa Jepang Bahasa Melayu Bahasa Persia Bahasa Rusia Bahasa Thailand Bahasa Turki Bahasa Urdu

Pencarian berdasarkan :

SEMUA Pengarang Subjek ISBN/ISSN Pencarian Spesifik

Pencarian terakhir:

{{tmpObj[k].text}}

Ditapis dengan

  • Tahun Penerbitan
  • Ketersediaan
  • Lampiran
  • Tipe Koleksi
    Lihat Lebih Banyak
  • Format Fisik Dokumen
    Lihat Lebih Banyak
  • Lokasi
  • Bahasa
    Lihat Lebih Banyak
Ditemukan 7 dari pencarian Anda melalui kata kunci: subject="Struktur Data"
cover
Struktur data dan algoritma : dalam pemrograman turbo pascal
Komentar Bagikan
Hasbi, M.

Edisi
cet. ke-1
ISBN/ISSN
9799708885
Deskripsi Fisik
xvi, 385 hlm. ; 24 cm.
Judul Seri
-
No. Panggil
005.73 HAS s

Edisi
cet. ke-1
ISBN/ISSN
9799708885
Deskripsi Fisik
xvi, 385 hlm. ; 24 cm.
Judul Seri
-
No. Panggil
005.73 HAS s
Ketersediaan2
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Data modeling : a beginner's guide
Komentar Bagikan
Oppel, Andy

No Inv.: 138754, 138755/P/Perp/14/2c

Edisi
-
ISBN/ISSN
9780071623988
Deskripsi Fisik
xxiii, 338 hlm. ; 23 cm.
Judul Seri
-
No. Panggil
005.73 OPP d
Ketersediaan4
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Physically unclonable functions
Komentar Bagikan
Maes, Roel

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security syst…

Edisi
-
ISBN/ISSN
9783642413957
Deskripsi Fisik
xvii 193 hlm. ; il.
Judul Seri
-
No. Panggil
E1320
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Modern cryptography primer
Komentar Bagikan
Kościelny, CzesławKurkowski, MirosławSrebrny, Marian

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, mos…

Edisi
-
ISBN/ISSN
9783642413865
Deskripsi Fisik
xiv, 238 hlm. ; il. warna
Judul Seri
-
No. Panggil
E1318
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
The economics of information security and privacy
Komentar Bagikan
Böhme, Rainer

"In the late 1990s, researchers began to grasp that the roots of many information security failures can be better explained with the language of economics than by pointing to instances of technical flaws. This led to a thriving new interdisciplinary research field combining economic and engineering insights, measurement approaches and methodologies to ask fundamental questions concerning the vi…

Edisi
1st Ed
ISBN/ISSN
9783642394980
Deskripsi Fisik
xiii, 321 hlm. : il. warna.
Judul Seri
-
No. Panggil
E1265
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Introduction to public key infrastructures
Komentar Bagikan
Buchmann, Johannes A.Karatsiolis, EvangelosWiesmaier, Alexander

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures whi…

Edisi
-
ISBN/ISSN
9783642406577
Deskripsi Fisik
xv, 194 hlm. : il.
Judul Seri
-
No. Panggil
E1294
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
cover
Bluetooth security attacks : Comparative analysis, attacks, and countermeasures
Komentar Bagikan
Haataja, KeijoHyppönen, KonstantinPasanen, SannaToivanen, Pekka

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeas…

Edisi
-
ISBN/ISSN
9783642406461
Deskripsi Fisik
vii, 93 hlm. : il.
Judul Seri
SpringerBriefs in Computer Science
No. Panggil
E1293
Ketersediaan1
Tambahkan ke dalam keranjang
Unduh MARCSitasi
Perpustakaan Universitas Negeri Jakarta
  • Informasi
  • Layanan
  • Pustakawan
  • Area Anggota

Tentang Kami

Menjadikan perpustakaan yang tanggap terhadap kebutuhan sumber informasi, baik secara internal maupun eksternal sesuai dengan era globalisasi.

Cari

masukkan satu atau lebih kata kunci dari judul, pengarang, atau subjek

Donasi untuk SLiMS Kontribusi untuk SLiMS?

© 2026 — Senayan Developer Community

Ditenagai oleh SLiMS
Pilih subjek yang menarik bagi Anda
  • Karya Umum
  • Filsafat
  • Agama
  • Ilmu-ilmu Sosial
  • Bahasa
  • Ilmu-ilmu Murni
  • Ilmu-ilmu Terapan
  • Kesenian, Hiburan, dan Olahraga
  • Kesusastraan
  • Geografi dan Sejarah
Icons made by Freepik from www.flaticon.com
Pencarian Spesifik
Kemana ingin Anda bagikan?