Isi: - Sistem Biometrika - Karakter Biometrika - Pre-Processing - Pemisahan Ciri - Pencocokan - Sistem Verifikasi dengan Menggabungkan Biometrika Telapak Tangan dan Geometri Tangan - Verifikasi Citra Tanda Tangan dengan Metode Pola Busur Terlokalisasi - Sistem Verifikasi Sidik Jari Berbasis Bank Tapis Gabor - Sistem Screening Menggunakan Gabungan Citra Wajah dan Telapak Tangan dengan…
Contents: Chapter 1 Introduction to Security Chapter 2 Computer Systems Security Chapter 3 OS Hardening and Virtualization Chapter 4 Application Security Chapter 5 Network Design Elements and Network Threats Chapter 6 Network Perimeter Security Chapter 7 Securing Network Media and Devices Chapter 8 Physical Security and Authentication Models Chapter 9 Access Control Methods and …
Table of Contents: 1. The Study of Business, Government, and Society 2. The Dynamic Environment 3. Business Power 4. Critics of Business 5. Corporate Social Responsibility 6. Implementing Corporate Social Responsibility 7. Business Ethics 8. Making Ethical Decisions in Business 9. Business in Politics 10. Regulation of Business 11. Multinational Corporations 12. Globaliza…
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
Part I: AN INTRODUCTION TO INQUIRY. 1. Human Inquiry and Science. 2. Paradigms, Theory, and Social Research. 3. The Ethics and Politics of Social Research. Part II: THE STRUCTURING OF INQUIRY: QUANTITATIVE AND QUALITATIVE. 4. Research Design. 5. Conceptualization, Operationalization, and Measurement. 6. Indexes, Scales, and Typologies. 7. The Logic of Sampling. Part III: MODES OF OPERATION: Q…
Anak judul: spionase amatiran sebvuah negara adidaya. Judul asli: Legacy of ashes the history of CIA. Termasuk bibliografi.
Anak judul: spionase amatiran sebvuah negara adidaya. Judul asli: Legacy of ashes the history of CIA. Termasuk bibliografi.
Contents: [Article 13] aToucan: An Automated Framework to Derive UML Analysis Models from Use Case Models (Tao Yue, Lionel C. Briand, Yvan Labiche) [Article 14] Documenting Design-Pattern Instances: A Family of Experiments on Source-Code Comprehensibility (Giuseppe Scanniello, Carmine Gravino, Michele Risi, Genoveffa Tortora, Gabriella Dodero) [Article 15] Deciding Type-Based Partial-Order C…
Contents: [Article 7] Residual Investigation: Predictive and Precise Bug Detection [Article 8] A Large-Scale Evaluation of Automated unit Test Generation Using EvoSuite [Article 9] Conditional Commitments: Reasoning and Model Checkingrn[Article 10] A Unified Test Case Prioritization Approach [Article 11] Formal verification of Software Countermeasures Against Side-Channel Attacks [Article …