Termasuk bibliografi dan indeks. DAFTAR ISI: 1. Organisasi: para manajer, struktur, dan kegiatan-kegiatannya 2. Kebutuhan dan sumber informasi manajemen 3. Konsep sistem informasi manajemen 4. Sistem informasi manajemen 5. Sifat-sifat umum sistem informasi komputer 6. Sistem komputer 7. Software komputer 8. Komputer mikro 9. Sistem komunikasi dan da…
Terdapat bibliografi dan indeks. CONTENTS: 1. Introduction to Side-Channel Attacks (Standaert, Fran
Termasuk bibliografi dan indeks. CONTENTS: 1 Introduction and Overview < >1.1 Cryptography basics < >1.2 Public-key cryptography < >< >1.2.1 RSAsystems < >< >1.2.2 Discrete logarithmsystems < >< >1.2.3 Elliptic curve systems < >1.3 Why elliptic curve cryptography? < >1.4 Roadmap < >1.5 Notes and fur…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer Basic Static Techniques < >Antivirus Scanning: A Useful First Step < >Hashing: A Fingerprint for Malware < >Finding Strings < >Packed and Obfuscated Malware < >Portable Executable File Format < >Linked Libraries and Functions < >Static Ana…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
null
null