A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that “looks” just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functi…
Buku ini sepenuhnya berisi pengalaman, pengorbanan, kejayaan serta fakta-fakta yang dahulu, dua puluh tahun lalu, masih tidak terungkap tetapi sekarang dikategorikan sebagai now it can be told. Boleh diungkapkan agar tidak hilang ditelan oleh perjalanan waktu. Tentu saja banyak cerita yang lucu dan pengalaman menarik para perwira tersebut selama mengabdikan diri dalam wadah TNI.
Table of contents: 1. Logs, trees, forest: the big picture 2. What is a log? 3. Log data sources 4. Log storage technologies 5. Syslog-NG case study 6. Covert logging 7. Analysis goals, planning, and preparation: what are we looking for? 8. Simple analysis techniques 9. Filtering, normalization, and correlation 10. Statistical analysis 11. Log data mining 12. Reporting and summariza…
Sekarang ini pengembangan perangkat lunak tidak bisa lepas dari aspek keamanannya yang menjadi penekanan pada Secure Software Development Lifecycle (SSDLC). Karena ada ada beberapa penyebab misalnya : mengidentifikasi dan memperbaiki masalah keamanan setelah aplikasi dirilis biasanya lebih mahal dan memakan waktu dibandingkan menangani masalah tersebut selama pengembangan. Bahkan Pelanggaran …
Catatan: terdapat indeks.
This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …
"This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to add…
Penjelasan buku “slow living” menawarkan wawasan tentang gaya hidup yang melambat namun tetap produktif. Ini mengajarkan kita untuk menikmati setiap momen tanpa terlalu sibuk berlari menuju tujuan akhir. Dalam melambat, kita bisa lebih memperhatikan kesehatan mental dan fisik kita, menjaga keseimbangan antara pekerjaan dan kehidupan pribadi. Daftar isi: BAB 1 Zaman yang terobsesi pada …
This new volume illustrates the diversified applications of IoT. The volume addresses the issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. Advances in Applications of Computational Intelligence and the Internet of Things (IoT) looks at the application of IoT in medical technology and healthcare, incl…