CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …
DAFTAR ISI: 1. Digital dan rangkaian 2. Sistem bilangan 3. Sistem sandi 4. Sistem operasi bilangan 5. Sistem logika 6. Rangkaian dasar logika 7. Gate circuit (pintu logika/gerbang logika) 8. Teori persamaan Boolean 9. Membentuk persamaan logika dari rangkaian logika 10. Membentuk kombinasi sistem logika (gate) 11. Metoda grafik karnaugh MAP 12. Rangkaian logika IC 13. Rangkaian log…
Terdapat bibliograf dan indeks CONTENT: PART 1 DC Circuits Chapter 1 Basic Concepts Chapter 2 Basic Laws Chapter 3 Methods of Analysis Chapter 4 Circuit Theorems Chapter 5 Operational Amplifiers Chapter 6 Capacitors and Inductors Chapter 7 First-Order Circuits Chapter 8 Second-Order Circuits PART 2 AC CIRCUITS Chapter 9 Sinusoids and Phasors Chapter 10 Sinusoidal Steady-St…
CONTENTS: 1. A bird's-eye view of modern cryptography 2. Elementary number theory and algebra background 3. Linear algebra 4. Sieve algorithms 5. Brute force cryptanalysis 6. The birthday paradox : sorting or not? 7. Birthday-based algorithms for functions 8. Birthday attacks through quadrisection 9. Fourier and Hadamard-Walsh transforms 10. Lattice reduction 11. Polynomial…
DAFTAR ISI: Bab 1 Pengenalan komponen elektronika Bab 2 pengenalan vademikum komponen elektronika Bab 3 Beberapa bentuk skema untuk proyek elektronika 1. Alarm 2. Bel pintu model baru 3. Bateray Indikator 4. Diode receiver 5. Voltage Doubler 6. Alarm suara burung 7. Alat test sederhana 8. Lampu darurat 9. Bell pintu arus PLN 10. Switch 11. Signal Gene…
CONTENTS: 1. The world of innovative management 2. The evolution of management thinking 3. The environment and corporate culture 4. Managing ethics and social responsibility 5. Managing start-ups and new ventures 6. Planning and goal setting 7. Strategy formulation and execution 8. Managerial decision making 9. Designing organization structure 10. Managing shange and innovation 11. M…
CONTENTS: 1. Machine generated contents note: Transformations of Cryptographic Schemes Through Interpolation Techniques / Michael N. Vrahatis 2. Flaws in the Initialisation Process of Stream Ciphers / Kenneth Koon-Ho Wong 3. Producing Fuzzy Inclusion and Entropy Measures / Basil K. Papadopoulos 4. On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle …
CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…
CONTENTS: 1. Meeting the Arduino family 2. The Arduino development environment 3. Interacting with the environment the digital way 4. Controlling outputs softly with analog outputs 5. Sensing the real world through digital inputs 6. Analog inputs to feel between all and nothing 7. Managing the time domain 8. Communicating with others 9. Dealing with interrupts 10. Arduino in a real ca…
Table of Contents: Part 1. Concepts, principles, guidelines, and techniques. Chap. 1. Evaluating : part of a ten-step process Chap. 2. Reasons for evaluating Chap. 3. The four levels : an overview Chap. 4. Evaluating reaction Chap. 5. Evaluating learning Chap. 6. Evaluating behavior Chap. 7. Evaluating results Chap. 8. Implementing the four levels Chap. 9. Managing change C…