Daftar isi: Bab 1 Analisis deskriptif 1.1 Analisis deskriptif sederhana 1.2 Analisis deskriptif lanjutan 1 1.3 Analisis deskriptif lanjutan 2 1.4 Analisis deskriptif tabulasi 1.5 Analisis deskriptif tabulasi lanjutan 1 1.6 Analisis deskriptif tabulasi lanjutan 2 1.7 Analisis deskriptif tabulasi lanjutan 3 1.8 Analisis deskriptif tabulasi lanjutan 4 Bab 2 Pembuatan nilai tabel 2.…
Daftar isi: 1 Apakah algoritma dan pemrograman itu 2 Struktur dasar algoritma 3 Notasi algoritmik 4 Tipe, operator dan ekspresi 5 Runtunan 6 Pemilihan 7 Pengulangan 8 Contoh-contoh pemecahan masalah I 9 Pengantar pemrograman modular 10 Prosedur 11 Fungsi 12 Larik 13 Contoh-contoh pemecahan masalah II 14 Matriks 15 Algoritma pencarian 16 Algoritma pengurutan 17 Pemros…
Daftar isi: 1. Pengenalan mikrokontroler dan arduino 2. Instalasi arduino ide 3. Pembuatan dan pemunggahan sketch 4. Penguasaan dasar pemrograman 5. Matematikaria 6. Mendawai string 7. Penanganan IF dan perulangan 8. Eksperimen dengan LED 9. Berkomunikasi secara serial 10. Penggunaan array 11. Penciptaan fungsi 12. Penciptaan objek 13. Pembacaan pin 14. Bermain-main den…
Daftar isi: BAB 1 Produk BAB 2 Proses BAB 3 Konsep manajemen proyek BAB 4 Proses perangkat lunak dan metrik proyek BAB 5 Perencanaan proyek perangkat lunak BAB 6 Manajemen risiko BAB 7 Penjadwalan dan penelusuran proyek BAB 8 Jaminan kualitas perangkat lunak BAB 9 Manajemen konfigurasi perangkat lunak BAB 10 Rekayasa sistem BAB 11 Konsep dan prinsip analisis BAB 12 Pemode…
Daftar isi: BAB 1. Pengenalan python BAB 2. Dasar-dasar python BAB 3. List, tuple, set, dictionary BAB 4. Perulangan dan pengendalian kondisi BAB 5. Fungsi, modul pemrograman python BAB 6. Lebih lanjut tentang fungsi BAB 7. Modul dan package BAB 8. Operasi file BAB 9. Kelas dan object BAB 10. Penanganan eksepsi BAB 11. Pemrograman database BAB 12. Pemrograman G…
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional developme…
The world's best hackers are using Python to do their handiwork. Shouldn't you? Author Bio Justin Seitz is a Senior Security Researcher for Immunity, Inc., where he spends a great deal of time bughunting, reverse engineering, and doing Python development and malware analysis. Table of contents Introduction Chapter 1: Setting Up Your Development Environment Chapter 2: Debuggers and…
CONTENTS INTRODUCTION NETWORK ADMINISTRATION AND NETWORK MANAGEMENT NETWORK MANAGEMENT TOOLS ENOUGH GRIPING : WHAT’S THE SOLUTION ? FLOW-TOOLS AND ITS PREREQUISITES FLOWS AND THIS BOOK 1 FLOW FUNDAMENTALS WHAT IS A FLOW ? FLOW SYSTEM ARCHITECTURE THE HISTORY OF NETWORK FLOW FLOWS IN THE REAL WORLD FLOW EXPORT AND TIMEOUTS PACKET-SAMPLED FLOWS 2 COLLECTORS AND …
Part I Strategic Performance with Balanced Scorecards Chapter 1 Accelerating Strategic Performance Chapter 2 Developing Your Strategic Foundation Chapter 3 Preparing to Build Your Balanced Scorecard Chapter 4 Step-by-Step to Building Your Strategy Map Chapter 5 Step-by-Step from Strategy to Action Chapter 6 Step-by-Step to Selecting Metrics and Setting Targets Chapter 7 Step-by-St…