Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…
Terdapat bibliografi dan indeks. Table of contents: 1. Introduction : hacking on Twitter data 2. Microformats : semantic markup and common sense collide 3. Mailboxes : oldies but goodies 4. Twitter : friends, followers, and setwise operations 5. Twitter : the tweet, the whole tweet, and nothing but the tweet 6. LinkedIn : clustering your professional network for fun (and profit?) 7. G…
Daftar isi: 1. Pengantar machine learning 2. Klasifikasi dengan K-Nearest Neighbours 3. Support Vector Machine (SVM) 4. Pengenalan computational intelligence 5. Artificial Neural Network (ANN) 6. Supervised learning di neural network 7. Unsupervised learning di neural network 8. Fuzi logic 9. Genetic algorithm (GA) 10. Paricle swarm optimization 11. Natural dan artificial immune sys…
Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …
Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…
RESEARCH DESIGN PENDEKATAN KUALITATIF, KUANTITATIF, DAN MIXED EDISI KETIGA JOHN W. CRESWELL BAGIAN SATU: PERTIMBANGAN-PERTIMBANGAN AWAL 3 Bab Satu: Memilih Rancangan Penelitian 3 Tiga Jenis Rancangan 6 Tiga Komponen Penting dalam Rancangan Penelitian 6 Beberapa Pandangan-Dunia Filosofis 8 Pandangan-Dunia Post-Positivisme 11 Pandangan-Dunia Konstruktivisime Sosial 13 Pandangan-Dunia Adv…
Contents: 1 Introduction 2 A general automaton 3 A general automaton: detailed analysis 4 Processing of knowledge about automata 5 A general system of interactive automata 6 Processing of knowledge about systems of automata 7 Changing expressions of knowledge of communication from one form and style to another 8 Electronic security through pseudo langueges Appendix A: Analysis for an…
Daftar isi: Bab 1 Pengantar 1.1 Kecerdasan Buatan 1.2 Topik-topik Dalam Kecerdasan Buatan Referensi Bagian I Representasi Pengetahuan Bab 2 Logika Orde Pertama 2 .1 Pengantar 2.2 Beberapa Definisi 2.3 Interprestasi dalam logika orde pertama 2.4 Penggabung 2.5 Algoritma penggabungan cepat 2.6 Prinsip Resolusi 2.7 Rencana Resolusi Referensi Bab 3 Prolog 3.1 Pengantar 3.2 Sin…
Daftar isi: Bab 1. Pendahuluan 1.1 Definisi 1.2 Kecerdasan Buatan dan Kecerdasan Alami 1.3 Komputasi Kecerdasan Buatan dan Komputasi Konvensional 1.4 Sejarah kecerdasan Buatan 1.5 Lingkup Kecerdasan Buatan Pada Aplikasi 1.6 Apakah soft Computing itu? Bab 2. Masalah, Ruang Keadaan, Dan pencarian 2.1 Mendefinisikan Masalh sebagai suatu ruang Keadaan 2.2 Metode pencarian dan pelacaka…