CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…
Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…
Terdapat bibliografi dan indeks. CONTENTS: Chapter 1: Laser Generation Chapter 2: Optical Resonators Chapter 3: Laser Pumping Chapter 4: Rate Equations Chapter 5: Broadening Mechanisms Chapter 6: Beam Modification Chapter 7: Beam Characteristics Chapter 8: Types of Lasers Chapter 9: Beam Delivery Chapter 10: Heat and Fluid Flow During Laser Processing Chapter 11: The Microstructure Chapter 12:…
Jilid 1. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI: 1. Sistem pendukung manajemen: sebuah tinjauan 2. Sistem pengambilan keputusan, pemodelan dan pendukung 3. Sistem pendukung keputusan: Sebuah tinjauan 4. Pemodelan dan analisis 5. Kecerdasan bisnis: data warehousing, akuisisi data, data mining, analitik bi…
Jilid 2. Judul asli: Decision support systems and intelligent systems Termasuk bibliografi dan indeks. DAFTAR ISI: 10. Kecerdasan tiruan dan sistem pakar: sistem berbasis-aturan 11. Akuisisi, representasi, dan pertimbangan pengetahuan 12. Sistem cerdas lanjutan 13. Sistem cerdas pada internet 14. Electronic commerce 15. Integrasi, pengaruh, dan masa depan sistem p…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer Basic Static Techniques < >Antivirus Scanning: A Useful First Step < >Hashing: A Fingerprint for Malware < >Finding Strings < >Packed and Obfuscated Malware < >Portable Executable File Format < >Linked Libraries and Functions < >Static Ana…
Data visualisation, spatilization, and mltidimensionality.
null
Terdapat bibliografi dan indeks. CONTENTS: Chapter 1: Laser Generation Chapter 2: Optical Resonators Chapter 3: Laser Pumping Chapter 4: Rate Equations Chapter 5: Broadening Mechanisms Chapter 6: Beam Modification Chapter 7: Beam Characteristics Chapter 8: Types of Lasers Chapter 9: Beam Delivery Chapter 10: Heat and Fluid Flow During Laser Processing Chapter 11: The Microstructure Chapter 12:…