Computer access control is an ongoing challenge. Left to themselves, computers tend to treat one user no differently than another. Computers use authentication to confidently associate an identity with a person. Authentication: From Passwords to Public Keys gives readers a clear understanding of what an organization needs to reliably identify its users and how different techniques for verifying…
Daftar isi: BAB 1 Apa itu statistik? BAB 2 Memaparkan data BAB 3 Probabilitas BAB 4 Variabel acak BAB 5 Kisah dua distribusi BAB 6 Mengambil sampel (sampling) BAB 7 Interval keyakinan BAB 8 Menguji hipotesa BAB 9 Membandingkan dua populasi BAB 10 Desain eksperimen BAB 11 Regresi BAB 12 Kesimpulan Daftar pustaka
Table of contents 1. Getting Started 2. Loading and Adding 3. Tooling Up 4. Controlling Program Flow 5. Thanks for the Memories 6. Functions and the Stack 7. Linux Operating System Services 8. Programming GPIO Pins 9. Interacting with C and Python 10. Interfacing with Kotlin and Swift 11. Multiply, Divide, and Accumulate 12. Floating-Point Operations 13. Neon Coprocessor 14. Opt…
Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of…
Bagian 1 Membentuk Organisasi Hari Esok 1 Bersiap Menghadapi Perubahan Organisasional 2 Bagaimana Pergeseran Generasi Akan Mentransformasi Kehidupan Organisasi 3 Jiwa Dari Organisasi Baru 4 Organisasi “Besar” di Masa Depan 5 Akankah Organisasi Masa Depan Mengulangi Kesalahan Masa Lalu? 6 Merancang untuk Implementabilitas 7 Keahlian Baru untuk Dunia Baru Bagian 2 Model Baru untuk Bek…
Judul asli "Decolonizing Methodologies: Research and Indigenous Peoples" Daftar isi: BAB 1 IMPERIALISME, SEJARAH, PENULISAN, DAN TEORI Imperialisme Menjadi Manusia Tulisan, Sejarah, dan Teori Pentingkah Sejarah bagi Bangsa Terjajah? Penulisan Teori BAB 2 MENELITI LEWAT MATA IMPERALIS Formasi Kultural Penelitian Barat Persinggungan Ras Dan Gender Konseptualisasi Individu dan Masy…
Contents Part I: Concepts and processes 1. History and functions of reference service 2. Ethical aspects of reference service 3. The reference interview 4. Organization of information and search strategies 5. Electronic resources for reference 6. Understanding electronic information systems for reference 7. Access-related reference services 8. Instruction 9. Training and continual l…
Table of Contents: Chapter 1. The Practice of Applied Network Security Monitoring Chapter 2. Planning Data Collection Chapter 3. The Sensor Platform Chapter 4. Session Data Chapter 5. Full Packet Capture Data Chapter 6. Packet String Data Chapter 7. Detection Mechanisms, Indicators of Compromise, and Signatures Chapter 8. Reputation-Based Detection Chapter 9. Signature-Based Detection …