Table of contents: 1. Introduction 2. The rise of the digital dossier 3. Kafka and Orwell : reconceptualizing information privacy 4. The problems of information privacy law 5. The limits of market-based solutions 6. Architecture and the protection of privacy 7. The problem of public records 8. Access and aggregation : rethinking privacy and transparency 9. Government information gathe…
Table of contents: Pt. I. Introduction to IDA Ch. 1. Introduction to Disassembly Ch. 2. Reversing and Disassembly Tools Ch. 3. IDA Pro Background Pt. II. Basic IDA Usage Ch. 4. Getting Started with IDA Ch. 5. IDA Data Displays Ch. 6. Disassembly Navigation Ch. 7. Disassembly Manipulation Ch. 8. Datatypes and Data Structures Ch. 9. Cross-References and Graphing Ch. 10. The Many Faces…
Table of Contents Chapter 1 Everything You Know Is Wrong The Myth of a Monoculture The iOS Security Model Storing the Key with the Lock Passcodes Equate to Weak Security Forensic Data Trumps Encryption External Data Is at Risk, Too Hijacking Traffic Trust No One, Not Even Your Application Physical Access Is …
Daftar isi: 1 Pendahuluan 1.1 Bagaimana menggunakan buku ini 1.2 Perlengkapan yang diperlukan 1.3 Perencanaan aplikasi 2 Instalasi 2.1 JDK (java development kit) 2.2 Netbeans 2.3 Xampp 2.4 iReport 3 Cara menggunakan program penjualan 3.1 Memulai xampp 3.2 Cara menggunakan program aplikasi penjualan 4 Pengenalan java, mysql dan ireport 4.1 Java 4.2 MySQL 4.3 iReport 5 …
Daftar isi: Konsep dasar listrik Konsep rangkaian listrik Rangkaian elektronika sederhana untuk kebutuhan rumah Industri kreatif Daftar pustaka
Ch 1 Introduction to e-discovery and digital evidence Ch 2 A brief history of e-discovery Ch 3 E-discovery planning and tools Ch 4 Experts: the right person for the right job Ch 5 Digital evidence case flow Ch 6 Case study: from beginning to trial Ch 7 Information governance and litigation preparedness Ch 8 Researching e-discovery case law Ch 9 The future of e-discovery
Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…
Daftar isi: Bab 1 Pengantar PHP Bab 2 Pemrograman PHP Bab 3 Menciptakan situs dinamis Bab 4 Pengantar MySQL Bab 5 Pemrograman MySQL Bab 6 Lebih lanjut dengan MySQL Bab 7 Menggunakan PHP dan MySQL Bab 8 Lebih dengan PHP dan MySQL Daftar pustaka
Daftar isi: BAB. 1 Pengenalan Android 1.2. Sejarah Android 1.3. Arsitektur Aplikasi Berbasis Android 1.4. PHP dan Mysql Sebagai Web Service BA…
Daftar isi: Bab 1 Instalasi sistem database IBM DB2 dan MySQL Bab 2 Instalasi paket IBM data studio client Bab 3 Instalasi driver IBM DB2 untuk PHP Bab 4 Membuat aplikasi CRUD dengan PHP dan IBM DB2 Bab 5 Merancang database aplikasi dengan IBM DB2 dan MySQL Bab 6 Membuat halaman publik aplikasi berjualan online Bab 7 Membuat halaman admin aplikasi penjualan online Bab 8 Membua…