Dari landscape evolusi internet, setelah era PC terjadi peningkatan tajam pengguna internet dan semua kegiatan yang kita lakukan secara online, mendorong peningkatan data secara exponensial, sehingga melahirkan era big data, karena proses datafication, analytics dan data mining oleh Data Driven Entreprise sebagai Data Controller yang mengumpulkan data dari semua kegiatan kita sehari-hari. Co…
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered ove…
The Pragmatic Programmer is one of those rare tech books you’ll read, re-read, and read again over the years. Whether you’re new to the field or an experienced practitioner, you’ll come away with fresh insights each and every time.. This new edition re-examines what it means to be a modern programmer. Topics range from personal responsibility and career development to architectural techn…
Table of Contents Part I: Introduction Chapter 1. Introduction to Science Abstract Chapter Objectives What is Science Types of Science Science is Messy From Ptolemy to Einstein—Science and the Discovery of the Nature of the Sky Summary and Conclusions Endnotes Chapter 2. Science and Cyber Security Abstract Chapter Objectives Defi…
Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…
Contents: Chapter 1 Introduction to system analysis and design Phase 1: System planning Chapter 2 Analyzing the business case Phase 2: System analysis Chapter 3 Requirements modeling Chapter 4 Enterprise modeling Chapter 5 Development strategies Phase 3: Sytem design Chapter 6 Dasa design Chapter 7 User interface, input, and output design Chapter 8 System architecture Phase …
CONTENTS: Pt. 1. Foundations of Management Ch. 1. Managing Ch. 2. The External Environment and Organizational Culture Ch. 3. Managerial Decision Making Pt. 2. Planning: Delivering Strategic Value Ch. 4. Planning and Strategic Management Ch. 5. Ethics and Corporate Responsibility Ch. 6. International Management Ch. 7. Entrepreneurship Pt. 3. Organizing: Building a Dynamic …
Anak judul: kepemimpinan dan kerja sama dalam dunia yang kompetitif. Judul asli: Management: leading & collaborating in a competitive world. DAFTAR ISI: 10. Manajemen sumber daya manusia strategi manajemen sumber daya manusia penempatan staf organisasi pengembangan tenaga kerja penilaian kinerja merancang sistem imbalan peraturan tenaga kerja …
Table of Contents Preface to the Second Edition. Preface to the First Edition. Acknowledgments for the Second Edition. Acknowledgments for the First Edition. 1. Introduction and Preview. 1.1 Preview of the Book. 2. Entropy, Relative Entropy, and Mutual Information. 2.1 Entropy. 2.2 Joint Entropy and Conditional Entropy. 2.3 Relative Entropy and Mutual Information. 2.4 Relationship…