Contents 1. Introduction 1.1 Cryptography: main topics 1.2 Some background from probability theory 1.3 The computational model 1.4 Motivation to the rigorous treatment 1.5 Miscellaneous 2. Computational difficulty 2.1 One- way functions: motivation 2.2 One-way functions: definitions 2.3 Weak one- way functions imply strong ones 2.4 One-way functions : variations 2.5 Hard-core pr…
Assist Telco and ISP engineers and technicians in their transition to IP telephony Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks Provides a step-by-step approach to designing a VoIP network Outlines each VoIP technology components with detailed descriptions of possible applications Provides a thorough description of Voice over…
In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and e…
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive att…
Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" i…
Sencha adalah salah satu yang tergerak untuk mengakomodasi para pengembang web dalam membuat aplikasi Android. Dengan Sencha Touch, Anda dapat membuat aplikasi Android menggunakan bahasa pemrograman web, yaitu HTML, CSS, dan JavaScript. Buku Pemrograman Aplikasi Android dengan Sencha Touch ini membahas secara praktis bagaimana membuat aplikasi Android menggunakan Sencha Touch. Setelah memahami …
Daftar isi: BAGIAN PERTAMA Bab 1 Pengenalan robotika Bab 2 Mekatronika robot mobile Bab 3 Mekatronika robot hexapod Bab 4 Mekatronika humanoid robot Bab 5 Sistem elektonika robot Bab 6 Pengenalan dan instalasi mikroprosesor raspberry Pi Bab 7 Network mikroprosesor raspberry Pi Bab 8 Instalasi library python pada raspberry Bab 9 Dasar pemrograman python BAGIAN KEDUA Bab 10 Pemro…
Data mining adalah serangkaian proses untuk menggali nilai tambah berupa informasi yang selama ini tidak diketahui secara manual dari suatu basis data. Informasi diperoleh dengan cara mengekstraksi dan mengenali pola data yang terdapat pada basis data.Buku ini berisi ringkasan-ringkasan dari mulai materi konsep data mining, teknik klasifikasi decision tree, support vector machine, teorema bayes…
Menyajikan tentang berbagai hal penting sekitar dunia komputer dan teknologi informasi