Table of contents: Digital investigation foundations Computer foundations Hard disk data acquisition Volume analysis PC-based partitions Server-based partitions Multiple disk volumes File system analysis FAT concepts and analysis FAT data structures NTFS concepts NTFS analysis …
Daftar isi: Bab 1 Pendahuluan Bab 2 Array dan string Bab 3 Struktur Bab 4 Subprogram dan rekursi Bab 5 Sorting Bab 6 Searching Bab 7 Stack Bab 8 Queue Bab 9 Pointer dan linked list Bab 10 Evaluasi
Terdapat bibliografi dan indeks.
1. A C++ Primer.
1.1 Basic C++ Programming Elements.
1.2 Expressions.
1.3 Control Flow.
1.4 Functions.
1.5 Classes.
1.6 C++ Program and File Organization.
1.7 Writing a C++ Program.
1.8 Exercises.
2. Object-Oriented Design.
2.1 Goals, Principles, and Patterns.
2.2 Inheritance and Polymorph…
Table of Contents 1. Introduction Abstract 1.1 Open collaborative human summarization 1.2 The necessity of automatic text summarization 1.3 Practice in search engines 1.4 Practice in e-science: summarizing multiple scientific papers through citation 1.5 A multi-dimensional perspective of summarization literature 1.6 Character…
Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…
Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …
Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…
Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Daftar isi: Bab I Pemrograman berorientasi objek 1.1 Mengapa pemrograman berorientasi objek? 1.2 Pendekatan terstruktur 1.3 Pendekatan berorientasi objek 1.4 Perkembangan teknik pemrograman 1.5 Bahasa pemrograman C# 1.6 Bahasa pemrograman C# dan framework .NET Bab II Analisis dan perencanaan sistem 2.1 Sasaran pengembangan perangkat lunak 2.2 System Development Life Cycle (S…