Contents 1 Introduction 2 Visual motion perception 3 Optimization networks 4 Visual motion perception networks 5 Analog VLSI implementation 6 Smooth optical flow chip 7 Extended network implementations 8 Comparison to human motion vision Appendix A Variational calculus B Simulation methods C Transistors and basic circuits D Process parameters and chips specifications
Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …
Judul Asli: Management reset: organizing for sustainable effectiveness DAFTAR ISI: 1. Waktu Untuk mengatur kembali 2. Manajemen berkesinambungan 3. Strategi untuk efektivitas berkesinambungan 4. Mengembangkan strategi 5. Tata kelola dewan 6. Struktur untuk efektivitas berkesinambungan 7. System kerja berkesinambungan 8. Mengelola kinerja 9. System reward 10. Mengelola talenta 11. M…
Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery
Table of Contents 1: Computer Forensics and Investigation Processes. 2: Understanding Computing Investigations. 3: The Investigator's Office and Laboratory. 4: Data Acquisitions. 5: Processing Crime and Incident Scenes. 6: Working with Windows and DOS Systems. 7: Current Computer Forensics Tools. 8: Macintosh and Linux Boot Processes and File Systems. 9: Computer Forensics Analysis. …
Contents: Part I Getting started Chapter 1 Starting with linux Chapter 2 Creating the perfect linux desktop Part II Becoming a linux power user Chapter 3 Using the shell Chapter 4 Moving around the filesystem Chapter 5 Working with text files Chapter 6 Managing running processes Chapter 7 Writing simple shell scripts Part III Becoming a linux system administrator Chapter…
Judul Asli: dBASE IV Quick reference Daftar isi: Acuan perintah Dbase IV Fungsi Dbase IV Fungsi SQL Indeks
Contents Part I Malware blueprint Chapter 1 Malware analysis 101 Chapter 2 Malware taxonomy Chapter 3 Malware deployment Chapter 4 Protective mechanisms Chapter 5 Malware dependencies Part II Malware research lab Chapter 6 Malware collection Chapter 7 Static analysis lab Chapter 8 Dynamic analysis lab Part III Malware inspection Chapter 9 The portable executable file Chapter …
Contents Part I Language technologies for real-time C++ 1 Getting started with real-time C++ 2 Working with a real-time C++ program on a board 3 An easy jump-start in real-time C++ 4 Object-oriented techniques for microcontrollers 5 C++ templates for microcontrollers 6 Optimized C++ programming for microcontrollers Part II Components for real-time C++ 7 Accessing mic 8 The right sta…
Aplikasi Secure Electronic Contract Signing (SECS-1) merupakan aplikasi penandatanganan kontrak secara elektronik sebagai perjanjian kerja maupun kerjasama antar intsansi yang berkepentingan. Aplikasi SECS-1 dibuat oleh Qusyairi Ridho Saeful Fidni pada tahun 2012. Aplikasi tersebut mengimplementasikan protokol simultaneous contract signing sebagai protokol standart dalam penandatanganan kontak …