Table of Contents Chapter 0 Reader's and Instructor's guide Chapter 1 Overview PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Chapter 5 Database and Cloud Security Chapter 6 Malicious Software Chapter 7 Denial-of-Service Attacks Chapter 8 Intrusion Detection Chapter 9 Firewalls and Intrusio…
Part One: Overview Ch 1. Data communication, data networks and the internet Ch 2. Protocol architecture, TCP/IP, and internet-vbased applications Part Two: Data communications Ch 3. Data transmission Ch 4. Transmission media Ch 5. Signal encoding techniques Ch 6. Digital data communication techniques Ch 7. Dtat link control protocoils Ch 8. Multiplexing Ch 9. Spread spectrum Part …
Terdapat bibliografi dan indeks. Table of Contents Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERV…
Contents: Chapter 0. Reader's Guide 1 0.1. Outline of this Book 0.2. A Roadmap for Readers and Instructors 0.3. Internet and Web Resources 0.4. Standards Chapter 1. Overview 1.1. Computer Security Concepts 1.2. The OSI Security Architecture 1.3. Security Attacks 1.4. Security Services 1.5. Security Mechanisms 1.6. A Model for Network Security 1.7. Recommended Reading and Web Si…
Contents: Chapter 1 Introduction Part One Conventional encryption Chapter 2 Conventional encryption: classical techniques Chapter 3 Conventional encryption: modern techniques Chapter 4 Conventional encryption: algorithm Chapter 5 Confidentility using Conventional encryption Part Two Public-key encryption and hash functions Chapter 6 Public-key cryptography Chapter 7 Introduction to…
Daftar Isi: Bagian I: Tinjauan Singkat Bab 1. Pendahuluan 1.1. Organisasi dan Arsitektur 1.2. Struktur dan Fungsi 1.3. Outline Buku Bab 2. Evolusi dan Kinerja Komputer 2.1. Sejarah Singkat Komputer 2.2. Perancangan Kinerja 2.3. Evolusi Pentium dan PowerPC 2.4. Bacaan yang Dianjurkan 2.5. Soal-soal Bagian II: Sistem Komputer Bab 3. Bus-bus Sistem 3.1. Komponen-komponen Komput…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Contents: Chapter 1. Introduction Section 1.1. Security Trends Section 1.2. The OSI Security Architecture Section 1.3. Security Attacks Section 1.4. Security Services Section 1.5. Security Mechanisms Section 1.6. A Model for Network Security Section 1.7. Recommended Reading and Web Sites Section 1.8. Key Terms, Review Questions, and Problems Part One: Symmetric Ciphers Chapter…
Judul asli: Computer organization and architecture Daftar isi: Bagian III CENTRAL PROCESSING UNIT (LANJUTAN) BAB 9 Set instruksi: karakteristik & fungsi 9.1 Karakteristik-karakteristik instruksi mesin 9.2 Jenis operand 9.3 Jenin-jenis operasi 9.4 Bahasa asembli 9.5 Bacaan yang dianjurkan 9.6 Soal-soal BAB 10 Set instruksi: mode dan format pengalamatan 10.1 Pengalaman 10.2 Fo…
Contents: Chapter 0 Reader’s guide Part one background Chapter 1 Computer system overview Chapter 2 Operating system overview Part two processes Chapter 3 Process description and control Chapter 4 Threads, SMP, and microkernels Chapter 5 Concurrency: mutual exclusion and synchronization Chapter 6 Concurrency: deadlock and starvation Part three memory Chapter 7 Memory manag…