Arduino merupakan platform komputasi fisik yang berbasis pada papan input atau output yang menggunakan bahasa pemrograman sendiri. Arduino dapat digunakan untuk mengembangkan objek interaktif mandiri atau dapat dihubungkan ke perangkat lunak pada komputer (seperti flash atau Max/MSP). Arduino ini menggunakan software open source yang dapat dijalankan pada Windows, Mac, dan Linux
Salah satu bahasa Pemrograman yg harus dikuasai oleh pengembang aplikasi berbasis web adalah Javascript. Secara defakto, Javascript adalah satu-satunya bahasa pemrograman yg ada dalam lingkungan browser web, yg didukung oleh semua browser web modern. Menguasai dasar pemrograman javascript menjadi keharusan, karena kita akan dapat mengetahui bagaimana suatu halaman web bisa ditampilkan untuk men…
Brief Contents Chapter 1 Introduction to the management of information security Chapter 2 Compliance: law and ethics Chapter 3 Governance and strategic planning for security Chapter 4 Information security policy Chapter 5 Developing the security program Chapter 6 Risk management: identifying and assessing risk Chapter 7 Risk management: controlling risk Chapter 8 Security management m…
Buku Sakti Wireless Hacking ini merupakan edisi revisi dari buku yang berjudul Step by Step Wireless Hacking . Pergantian judul dilakukan karena ada berbagai penambahan materi dan update lainnya. Tujuannya agar menjadi lebih fokus dan tepat sasaran dalam melakukan aksi wireless hacking. Melalui buku ini, Anda mempelajari bagaimana mencari, bahkan mengeksploitasi kelemahan yang ada pada jaringa…
Buku ini membahas cara menggunakan heading untuk membuat judul, ,menomori dan mengelola gambar secara otomatis, menomori dan mengelola tabel secara otomatis Daftar Isi: Bab 1 Desain dokumen Bab 2 Mengelola judul bab dan subbab Bab 3 Mengelola gambar Bab 4 Mengelola tabel Bab 5 Mengelola persamaan Bab 6 Mengelola kutipan Bab 7 Pengaturan nomor halaman dan footnote Bab 8 Membuat daftar…
Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implem…
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, …
Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Protect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions Understand how to create cyber-threat defense solutions effectively Book Description Are you looking for effe…
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discove…