Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …
Daftar isi Bab 1 Pendahuluan Bab 2 Membuat model SEM den gan AMOS Bab 3 Menentukan degree of freedom Bab 4 Dasar Penilaian dan estimasi model Bab 5 Asumsi dan persyaratan pada SEM Bab 6 Persiapan analisis SEM Bab 7 Uji measurement model Bab 8 Uji structural model Bab 9 Modifikasi model SEM Bab 10 Multiple group analysis Bab 11 SEM dengan PATH ANALYSIS Bab 12 Membuat teks program Ba…
Daftar isi: BAGIAN KONVENSI Bagian 1. Pengenalan android Bagian 2. Persiapan coding Bagian 3. Hello android Bagian 4. User interface (UI) Bagian 5. Activity Bagian 6. Widget Bagian 7. More view Bagian 8. Droiddraw Bagian 9. Webkit Bagian 10. Bekerja dengan array dan file Bagian 11. Database di android Bagian 12. Coding MAPS Bagian 13. Handle telephone Bagian 14. Running project…
Contents: Part I Quantum communication 1 Quatum information theory for quantum communication 2 Quantum communication for the ultimate capacity and security 3 Quantum communication for the experiments over optical fiber 4 Spin-photo entanglement in semiconductor quantum dots: towards solid-state-based quantum repeaters Part II Quatum metrology and sensing 5 Optical lattice c…
Contents: Part I. Introduction 1. Introduction 2. Installing mysql 3. Using the mysql monitor Part II. Using mysql 4. Modeling and designing database 5. Basic SQL 6. Working with database structures 7. Advanced querying 8. Doing more with mysql 9. Managing users and privileges Part III. Advanced topics 10. Backup and recovery 11. Using an options file 12. Configur…
Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…
Contents: 1 Introduction 1.1 Motivation 1.2 Organization References 2 Fundamentals of optical wireless communications 2.1 Introduction 2.2 Communications blocks in an OWC system 2.3 Intensity modulation/direct detection (IM/DD) 2.4 Optical transmitters 2.5 Optical receivers 2.6 Optical wireless channel propagation characteristics 2.7 Conclusions References 3 Indoor optical …
Contents: Chapter 1. Decision-making 1.1 Normative theory versus engineering theory 1.2 The decision process 1.3 Decision-making within the organization 1.4 Changes to management within organization Chapter 2. Decision support systems 2.1 DSS: definitions and typologies 2.2 DSS engineering Chapter 3. The influence of DSS on decision-making and associated risks 3.1 Factors influe…
Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …