The contents in this book will provide practical hands on implementation and demonstration guide on how you can use Kali Linux to deploy various attacks on both wired and wireless networks. If you are truly interested in becoming an Ethical Hacker or Penetration Tester, this book is for you.NOTE: If you attempt to use any of this tools on a wired or wireless network without being authorized and…
Buku Materi Pokok (BMP) SKOM4101 PENGANTAR ILMU KOMUNIKASI, merupakan mata kuliah paling dasar dalam mempelajari ilmu komunikasi. Di dalamnya membahas tentang kegiatan komunikasi yang dilakukan manusia, sejarah perkembangan dan keberadaan ilmu komunikasi, pengertian dan proses berlangsungnya komunikasi, komponen-komponen dan model-model komunikasi, fungsi komunikasi, teknik-teknik dan media dal…
Sistematika buku Pemasaran Jasa: Tren Pemasaran Pada Era Digital ini mengacu pada pendekatan konsep teoritis dan contoh penerapan. Buku ini terdiri atas 16 bab yang dibahas secara rinci, diantaranya: Bab 1 Konsep dan Sistem Pemasaran Jasa, Bab 2 Dinamika Bisnis Jasa dan Pentingnya Pemasaran Jasa, Bab 3 Perencanaan Strategis dan Proses Pemasaran Jasa, Bab 4 Perilaku Konsumen dalam Konteks Jasa, …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. Af…
Description Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating sy…
Topics : Management information systems, Systèmes d'information de gestion, Management informatiesystemen, Informationsmanagement, Managementinformationssystem, Gestion d'entreprise -- Systèmes d'information, Gestion -- Informatique, Gestion de l'information, Syst*mes d'information, Management Information systems
Beyond Pseudo-Rotations in Pseudo-Euclidean Spaces presents for the first time a unified study of the Lorentz transformation group SO(m, n) of signature (m, n), m, n - N, which is fully analogous to the Lorentz group SO(1, 3) of Einstein's special theory of relativity. It is based on a novel parametric realization of pseudo-rotations by a vector-like parameter with two orientation parameters.…
This self-contained reference provides fundamental knowledge of Bayesian reliability and utilizes numerous examples to show how Bayesian models can solve real life reliability problems. It teaches engineers and scientists exactly what Bayesian analysis is, what its benefits are, and how they can apply the methods to solve their own problems. To help readers get started quickly, the book present…
This compendium is a completely revised version of an earlier book, Data Mining in Time Series Databases, by the same editors. It provides a unique collection of new articles written by leading experts that account for the latest developments in the field of time series and data stream mining. The emerging topics covered by the book include weightless neural modeling for mining data streams,…
Distributed Systems: Concurrency and Consistency explores the gray area of distributed systems and draws a map of weak consistency criteria, identifying several families and demonstrating how these may be implemented into a programming language. Unlike their sequential counterparts, distributed systems are much more difficult to design, and are therefore prone to problems. On a large scale, u…