In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols. In such algorithms, the ciphertext is the sum of the keystream and the plaintext, resembling the one-time pad principal. Although the idea behind stream ci…
Distributed Systems: Concurrency and Consistency explores the gray area of distributed systems and draws a map of weak consistency criteria, identifying several families and demonstrating how these may be implemented into a programming language. Unlike their sequential counterparts, distributed systems are much more difficult to design, and are therefore prone to problems. On a large scale, u…
Buku yang sangat berguna bagi siapa saja yang hendak membuat aneka proyek berbasis Arduino yang melibatkan peranti pendukung komunikasi nirkabel. Buku ini membahas setiap peranti dimulai dari hal yang mendasar. Kemudian, secara bertahap membahas contoh-contoh yang lebih menantang. Dengan begitu, siapa saja dapat dengan mudah mempraktikkan dan memahami materi yang disajikan. Daftar isi: BAB …
Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…
"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…
Daftar Isi: Prakata Pengantar 1. Teori Rangkaian 2. Rangkaian Elektronika 3. Sistem Digital dan Komputer 4. Sistem Kontrol 5. Komunikasi Analog dan Digital 6. Teknik Tenaga Listrik Daftar Pustaka
Table of contents Cover Title Page Copyright Page Dedication Contents Foreword to The Digital Economy: 20th Anniversary Edition Preface to The Digital Economy: 20th Anniversary Edition Original Preface to the 1995 Edition Acknowledgments for the 1995 Edition Acknowledgments for the 20th Anniversary Edition 20th Anniversary Edition Commentary on Chapter 1 Chapter one the age of Net…
This book makes powerful Field Programmable Gate Array (FPGA) and reconfigurable technology accessible to software engineers by covering different state-of-the-art high-level synthesis approaches (e.g., OpenCL and several C-to-gates compilers). It introduces FPGA technology, its programming model, and how various applications can be implemented on FPGAs without going through low-level hardware …
Meningkatnya kasus kriminal baik itu secara fisik maupun digital harus ditangani dengan cepat oleh pihak berwenang. Penerapan lie detector banyak digunakan untuk mengungkap kasus kriminal, terutama pada lingkungan Pusat Laboratorium Forensik Badan Reserse Kriminal Kepolisian Republik Indonesia (Puslabfor Bareskrim Polri). Penggunaan lie detector digunakan untuk penguat bukti pada proses Berita …