Artificial Intelligence (AI), yang dapat diterjemahkan sebagai Kecerdasan Buatan atau Kecerdasan Artifisial, terus menjadi teknologi yang semakin disruptif pada bidang perbankan, keuangan, hiburan, bisnis digital, dan e commerce. Hanya sebagian kecil (atau hampir tidak ada) perusahaan yang mengaplikasikan Al dalam otomatisasi proses bisnisnya. Alasan utamanya adalah model-model (baik itu kla…
Rekapitulasi serangan siber yang diterbitkan oleh Pusat operasi keamanan siber nasional Badan Siber dan Sandi Negara menunjukkan serangan yang diterima pada tahun 2021 dilakukan dengan metode serangan social engineering. Dalam mencegah serangan social engineering tersebut, maka diperlukan cara untuk meningkatkan kesadaran kemanan terhadap social engineering itu sendiri salah satunya dengan Educ…
Meningkatnya kejahatan dan serangan siber menjadikan keamanan jaringan sebagai prasyarat dasar bagi organisasi, tetapi organisasi tidak bisa menjamin hal tersebut karena penggunaan Intrusion Detection System (IDS) pada suatu organisasi masih menggunakan IDS bersensor tunggal, baik hanya berupa Host-Based IDS (HIDS) maupun hanya berupa Network-Based IDS (NIDS). Batasan ruang lingkup deteksi kedu…
This book offers practical guidelines on creating value from the application of data science based on selected artificial intelligence methods. Contents Part 1 Data Science Based on Artificial Intelligence Artificial Intelligence-Based Data Science Solutions Business Problems Dependent on Data Integrate and Conquer The Lost-in-Translation Trap Part 2 The AI-Based Data Science Workf…
This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies.…
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Terdapat bibliografi dan indeks. Table of contents: Pt.1 Regulability Code is law Four puzzles from cyberspace Is-Ism Architectures of control Regulating code Pt.2 Code and other regulation Cyberspaces What things regulate Thhe limits in open source Pt.3 Applications Translation Intellectual property Privacy Free speech Interlude Sovereignty Pt.4…
Terdapat bibliografi dan indeks. Table of contents: 1. Introduction : hacking on Twitter data 2. Microformats : semantic markup and common sense collide 3. Mailboxes : oldies but goodies 4. Twitter : friends, followers, and setwise operations 5. Twitter : the tweet, the whole tweet, and nothing but the tweet 6. LinkedIn : clustering your professional network for fun (and profit?) 7. G…
Daftar isi: 1. Pengantar machine learning 2. Klasifikasi dengan K-Nearest Neighbours 3. Support Vector Machine (SVM) 4. Pengenalan computational intelligence 5. Artificial Neural Network (ANN) 6. Supervised learning di neural network 7. Unsupervised learning di neural network 8. Fuzi logic 9. Genetic algorithm (GA) 10. Paricle swarm optimization 11. Natural dan artificial immune sys…
Contents: Introduction Assessment test Chapter 1 Secrets of successful auditor Understanding the demand for IS audits Understanding policies, standards, guidelines, and procedures Understanding professional ethics Understanding the purpose of an audit Differentiating between auditor and auditee roles Implementing audit standards Auditor is an executive position Understanding the …