This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…
Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the in…
DAFTAR ISI 1 Dasar Pemrograman Berorientasi Objek 1.1 Paradigma Pemrograman 1.1.1 Imperatif dan Deklaratif 1.1.2 Pemrograman Terstruktur 1.1.3 Pemrograman Prosedural 1.2 Pemrograman Berorientasi Objek 1.3 Konsep Dasar PBO 1.3.1 Objek dan Kelas 1.3.2 Encapsulation 1.3.3 Inheritance 1.3.4 Polymorphism 1.4 Bahasa Pemrograman Berorientasi Objek 1.5 Perbedaan PBO…
DAFTAR ISI BAB 1 POHON A. Tujuan Pembelajaran B. Pendahuluan C. Traversal D. Pohon Biner E. Operasi Pohon Biner F. Praktikum G. Evaluasi BAB 2 PENCARIAN POHON BINER A. Tujuan Pembelajaran B. Pendahuluan C. Kelebihan dan kekurangan pencarian pohon biner D. Pohon AVL (Adelson, Velskii dan Landisr) E. Implementasi pencarian pohon biner F. Implementasi pencarian pohon b…
DAFTAR ISI BAB 1 KONSEP PEMROGRAMAN TERSTRUKTUR/PROSEDURAL A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Perkembangan Pemrograman D. Proses pengembangan perangkat lunak/software E. Ciri-ciri dan Konsep Pemrograman Terstruktur F. Soal Latihan BAB 2 TIPE DATA , VARIABEL, KONSTANTA, DAN I/O A. Tujuan Pembelajaran B. Pendahuluan C. Pengenalan bahasa C dan tools yang digun…
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…
Terdapat indeks. Table of contents: 1. Tiger and Leopard Mac OS X operating systems 2. Getting a handle on Mac hardware 3. Mac disks and partitioning 4. HFS plus file system 5. FileVault 6. Time machine 7. Acquiring forensic images 8. Recovering browser history 9. Recovery of e-mail artifacts, iChat, and other chat logs 10. Locating and recovering photos 11. Finding and recovering…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Pa…
Table of contents: Pt. I. Introduction to IDA Ch. 1. Introduction to Disassembly Ch. 2. Reversing and Disassembly Tools Ch. 3. IDA Pro Background Pt. II. Basic IDA Usage Ch. 4. Getting Started with IDA Ch. 5. IDA Data Displays Ch. 6. Disassembly Navigation Ch. 7. Disassembly Manipulation Ch. 8. Datatypes and Data Structures Ch. 9. Cross-References and Graphing Ch. 10. The Many Faces…