Contents: 1 An introduction to data protection today 2 The evolution 3 Backup integration 4 Bare metal restore 5 Management 6 Security 7 New feature in data protection 8 Disk-based protection technologies 9 Managing data life cycle and storage 10 Quality control 11 Tools for system
Contents: Inference and learning in planning (extended abstract) Mining heterogeneous information networks by exploring the power of links Learning on the web Learning and domain adaptation The two faces of active learning An iterative learning algorithm for within-network regression in the transductive setting Detecting new kinds of patient safety incidents Using data mining for wine…
Contents: Chapter 1 Introducing ubuntu Chapter 2 Installing ubuntu Chapter 3 Using Ubuntu on the desktop Chapter 4 Advanced usage and managing ubuntu Chapter 5 The Ubuntu server Chapter 6 Support and typical problems Chapter 7 Using kubuntu Chapter 8 The Ubuntu community Chapter 9 Ubuntu-related projects Chapter 10 Using edubuntu Appendix A: Welcome to the commad line App…
Judul asli Research Design Qualitative Quantitative, and Mix Methods Approoaches. Daftar isi: Bagian 1: pertimbangan-pertimbangan awal 1. Memilih rancangan penelitian Tiga jenis rancangan Tiga komponen penting dalam rancangan penelitian Pendekatan penelitian sebagai pandangan dunia, rancangan, dan metode Kriteria dalam memilih rancangan penelitian Ringkasan Bacaan tambahan 2. T…
Daftar isi: BAB I Pengantar kuliah bahasa indonesia BAB II Perkembangan bahasa indonesia BAB III Bahasa indonesia dengan berbagai ragamnya BAB IV Diksi atau pilihan kata BAB V Kalimat dalam bahasa indonesia BAB VI Paragraf dalam bahasa indonesia BAB VII Pernalaran BAB VIII Penerapan kaidah ejaan BAB IX Presentasi, pidato, ringkasan, dan resensi
Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …
Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …
Daftar isi: BAB 1 Logika proposal BAB 2 Teori himpunan BAB 3 Teori himpunan fuzzy BAB 4 Logika fuzzy BAB 5 Relasi klasik BAB 6 Fungsi BAB 7 Aljabar boole BAB 8 Teori graph BAB 9 Mesin matematika Daftar pustaka
Daftar isi: 1. Data dan statistika 2. Deskripsi data 3. Peluang 4. Peubah acak 5. Percontohan 6. Pendugaan nilai-tengah populasi 7. Uji hipotesis tentang nilai-tengah populasi 8. Prosedur uji hipotesis 9. Analisis ragam 10. Regresi dan korelasi 11. Analisis data kategorik Daftar pustaka
Daftar isi: BAB 1 Mengenal statistik nonparametrik BAB 2 Menu SPSS untuk persiapan data BAB 3 Statistika deskriptif untuk data nominal dan ordinal BAB 4 Uji satu sampel BAB 5 Uji dua sampel BAB 6 Uji lebih dari dua sampel BAB 7 Korelasi nonparametrik BAB 8 Uji nonparametrik secara praktis Daftar pustaka