Daftar isi: BAB 1 Pengenalan ide visual C# BAB 2 Keputusan BAB 3 Repetisi BAB 4 Metode dan array BAB 5 File dan struktur BAB 6 Struktur data Daftar pustaka
Daftar isi: Bab 1. Memulai SPSS 1.1 Memulai SPSS untuk windows 1.2 Data view 1.3 Variabel view 1.4 Menyimpan input data 1.5 Menyimpan output data Bab 2. Deskriptif Data 2.1 Statistika deskriptif 2.2 Statistika inferensial 2.3 Deskripsi data kuantitatif 2.4 Descriptive statistics-frequencies 2.5 Descriptive statistics-descriptives 2.6 Descriptive statistics-explore 2.7 Deskrip…
Daftar isi: 1. Apakah algoritma dan pemrograman itu? 2. Konstruksi dasar algoritma 3. Nama, tipe, ekspresi, dan nilai 4. Program input/output 5. Pemrograman dengan Pascal, C, dan C++ 6. Lebih jauh dengan runtunan 7. Pemlihan 8. Pengulangan 9. Pengantar pemrograman modular 10. Prosedur 11. Fungsi 12. Larik 13. Contoh-contoh soal dan penyelesaian (1) 14. Matriks 15. Algo…
Terdapat bibliografi dan indeks. Table of Contents: I. The Essentials of Network Perimeter Security 1. Perimeter Security Fundamentals 2. Packet Filtering 3. Stateful Firewalls 4. Proxy Firewalls 5. Security Policy II. Fortifying the Security Perimeter 6. The Role of a Router 7. Virtual Private Networks 8. Network Intrusion Detection 9. Host Hardening 10. Host Defense Component…
Terdapat bibliografi dan indeks. Table of contents: 1.Honeypots 2.Commercially Available Honeypots 3.Honeynets 4.Attacks and Role of Honeypots 5.Static Honeypots 6.Virtual Honeypots 7.Dynamic Honeypots 8.Wireless Honeypots 9.Applications of Honeypots 10.Anti-Honeypot Technology 11.Honeypots and Network Forensics
Contents: 1. What is penetration testing? 2. Reconnaissance 3. Scanning 4. Exploitation 5. Web based exploitation 6. Maintaining access with backdoors and rootkits. 7. Wrapping up the penetration test
Table of Contents Chapter 1. Introduction Why You are Reading This Book? The Path Ahead Chapter 2. History and Introduction to OSX History and Introduction to OSX Chapter 3. The Filesystem Introduction What is a File System? The Difference Between Memory Types Partition Tables Identifying GUIDs Booting Master Boot Records Blessed be Thy Volume Bootin…
Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Information…
Part One: Overview Ch 1. Data communication, data networks and the internet Ch 2. Protocol architecture, TCP/IP, and internet-vbased applications Part Two: Data communications Ch 3. Data transmission Ch 4. Transmission media Ch 5. Signal encoding techniques Ch 6. Digital data communication techniques Ch 7. Dtat link control protocoils Ch 8. Multiplexing Ch 9. Spread spectrum Part …
Terdapat bibliografi dan indeks. Table of Contents Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERV…