DAFTAR ISI 1 Dasar Pemrograman Berorientasi Objek 1.1 Paradigma Pemrograman 1.1.1 Imperatif dan Deklaratif 1.1.2 Pemrograman Terstruktur 1.1.3 Pemrograman Prosedural 1.2 Pemrograman Berorientasi Objek 1.3 Konsep Dasar PBO 1.3.1 Objek dan Kelas 1.3.2 Encapsulation 1.3.3 Inheritance 1.3.4 Polymorphism 1.4 Bahasa Pemrograman Berorientasi Objek 1.5 Perbedaan PBO…
DAFTAR ISI BAB 1 POHON A. Tujuan Pembelajaran B. Pendahuluan C. Traversal D. Pohon Biner E. Operasi Pohon Biner F. Praktikum G. Evaluasi BAB 2 PENCARIAN POHON BINER A. Tujuan Pembelajaran B. Pendahuluan C. Kelebihan dan kekurangan pencarian pohon biner D. Pohon AVL (Adelson, Velskii dan Landisr) E. Implementasi pencarian pohon biner F. Implementasi pencarian pohon b…
DAFTAR ISI BAB 1 KONSEP PEMROGRAMAN TERSTRUKTUR/PROSEDURAL A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Perkembangan Pemrograman D. Proses pengembangan perangkat lunak/software E. Ciri-ciri dan Konsep Pemrograman Terstruktur F. Soal Latihan BAB 2 TIPE DATA , VARIABEL, KONSTANTA, DAN I/O A. Tujuan Pembelajaran B. Pendahuluan C. Pengenalan bahasa C dan tools yang digun…
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…
Terdapat indeks. Table of contents: 1. Tiger and Leopard Mac OS X operating systems 2. Getting a handle on Mac hardware 3. Mac disks and partitioning 4. HFS plus file system 5. FileVault 6. Time machine 7. Acquiring forensic images 8. Recovering browser history 9. Recovery of e-mail artifacts, iChat, and other chat logs 10. Locating and recovering photos 11. Finding and recovering…
Daftar Isi Bab 1. JCA/JCE dan provider 1.1. Pengantar 1.2. Menginstal provider bouncy castle 1.3. Cara kerja provider 1.4. Memeriksa kapabilitas provider Bab 2. Kriptografi kunci simetris 2.1. Contoh pertama 2.2. Kelas utilitas dasar 2.3. Menggunakan AES 2.4. Pengganjalan cipher block simetris 2.5. Mode-mode cipher block simetris 2.6. Mode-mode cipher block simetris aliran 2.7.…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Table of contents: Pt. I. Introduction to IDA Ch. 1. Introduction to Disassembly Ch. 2. Reversing and Disassembly Tools Ch. 3. IDA Pro Background Pt. II. Basic IDA Usage Ch. 4. Getting Started with IDA Ch. 5. IDA Data Displays Ch. 6. Disassembly Navigation Ch. 7. Disassembly Manipulation Ch. 8. Datatypes and Data Structures Ch. 9. Cross-References and Graphing Ch. 10. The Many Faces…
Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…