Deskripsi: Ketika anda bingung atau menemui jalan buntu di dalam mengambil keputusan, inilah referensi yang Anda butuhkan. Menjelaskan metode atau teknik mengambil keputusan. Tekni yang disajikan berupa kerangka kerja (Framework) untuk mendapatkan pilihan yang tepat (terbaik) sesuai dengan tujuan yang hendak dicapai. Framework sangat mudah diikuti karena berupa suatu algoritma atau urutan kerj…
Daftar isi: Bab 1 Pengantar algoritma dan pemrograman Bab 2 Struktur dasar algoritma Bab 3 Pedoman penyusunan algoritma Bab 4 Dasar bahasa java Bab 5 Operasi seleksi Bab 6 Operasi pengulangan Bab 7 Larik Bab 8 Subrutin Bab 9 Rekursi Bab 10 Pencarian data Bab 11 Pengurutan data
> Mengenal Java dan JDBC > Cara Instalasi Software yang Digunakan > Variable Standard > Program Perhitungan > Program Database Input Data > Menu Pull Down > Program Layout Homepage > Insert Image > CRUD Database JSP > Study Kasus Web Sistem_Informasi_Nilai
Brief Contents Chapter 1: The JCA and the JCE Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chapter 9: CMS and S/MIME Chapter 10: S…
Contents: Chapter 1: A History of Cryptography 1 Chapter 2: Large Integer Computing 33 Chapter 3: The Integers 65 Chapter 4: Linear Diophantine Equations and Linear Congruences 89 Chapter 5: Linear Ciphers 105 Chapter 6: Systems of Linear Congruences—Single Modulus 125 Chapter 7: Matrix Ciphers 143 Chapter 8: Systems of Linear Congruences—Multiple Moduli 161 Chapter 9: Quadrati…
Contents: Chapter 1: The JCA and the JCE Chapter 2: Symmetric Key Cryptography Chapter 3: Message Digests, MACs, and HMACs Chapter 4: Asymmetric Key Cryptography Chapter 5: Object Description in Cryptography Using ASN.1 Chapter 6: Distinguished Names and Certificates Chapter 7: Certificate Revocation and Path Validation Chapter 8: Key and Certificate Management Using Keystores Chap…
Contents: 1 Introduction 2 Number Formats: The Representation of Large Numbers in C 3 Interface Semantics 4 The Fundamental Operations 5 Modular Arithmetic: Calculating with Residue Classes 6 Where All RoadsMeet:Modular Exponentiation 7 Bitwise and Logical Functions 8 Input, Output, Assignment, Conversion 9 Dynamic Registers 10 Basic Number-Theoretic Functions 11 Rijndael: …
Anak Judul: best practices for secure java web application development. Terdapat bibliografi dan indeks. CONTENTS: 1. Web Application Security Basics What Is Untrusted Data? HTTP Security Considerations HTTPS HTTP/S GET Request HTTP/S POST Request HTTP/S Response HTTP/S Response Headers Anti-Patterns and Weaknesses …
Daftar isi: 1. Dasar PHP 2. Definisi dan fungsi PHP 3. Install wampserver dan praktik PHP 4. Variabbel dan penulisan di PHP 5. Konstanta dan penulisan di PHP 6. Tipe data PHP 7. Data integer dan penulisan dalam PHP 8. Data float dan penulisan dalam PHP 9. Data string dan penulisan dalam PHP 10. Data array dan penulisan dalam PHP 11. Data Boolean dan penulisan dalam PHP 12. Operator …