Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the in…
DAFTAR ISI 1 Dasar Pemrograman Berorientasi Objek 1.1 Paradigma Pemrograman 1.1.1 Imperatif dan Deklaratif 1.1.2 Pemrograman Terstruktur 1.1.3 Pemrograman Prosedural 1.2 Pemrograman Berorientasi Objek 1.3 Konsep Dasar PBO 1.3.1 Objek dan Kelas 1.3.2 Encapsulation 1.3.3 Inheritance 1.3.4 Polymorphism 1.4 Bahasa Pemrograman Berorientasi Objek 1.5 Perbedaan PBO…
DAFTAR ISI BAB 1 POHON A. Tujuan Pembelajaran B. Pendahuluan C. Traversal D. Pohon Biner E. Operasi Pohon Biner F. Praktikum G. Evaluasi BAB 2 PENCARIAN POHON BINER A. Tujuan Pembelajaran B. Pendahuluan C. Kelebihan dan kekurangan pencarian pohon biner D. Pohon AVL (Adelson, Velskii dan Landisr) E. Implementasi pencarian pohon biner F. Implementasi pencarian pohon b…
DAFTAR ISI BAB 1 KONSEP PEMROGRAMAN TERSTRUKTUR/PROSEDURAL A. Tujuan Pembelajaran B. Pendahuluan C. Sejarah Perkembangan Pemrograman D. Proses pengembangan perangkat lunak/software E. Ciri-ciri dan Konsep Pemrograman Terstruktur F. Soal Latihan BAB 2 TIPE DATA , VARIABEL, KONSTANTA, DAN I/O A. Tujuan Pembelajaran B. Pendahuluan C. Pengenalan bahasa C dan tools yang digun…
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Terdapat bibliografi dan indeks. Table of contents: Pt. I General international law and cyberspace 1.Sovereignty 2.Due diligence 3.Jurisdiction 4.Law of international responsibility 5.Cyber operations not per se regulated by international law Pt. II Specialised regimes of international law and cyberspace 6.International human rights law 7.Diplomatic and consular law 8.Law of the …
Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…
Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…
Table of contents: Part I: Contemporary Security Chapter 1: The Need for Secure Systems Chapter 2: The Proactive Security Development Process Chapter 3: Security Principles to Live By Chapter 4: Threat Modeling Part II: Secure Coding Techniques Chapter 5: Public Enemy #1: The Buffer Overrun Chapter 6: Determining Appropriate Access Control Chapter 7:…
Terdapat bibliografi dan indeks. Table of contents: 1 - Introduction 2 - Forensic Laboratory Accommodation 3 - Setting up the Forensic Laboratory 4 - The Forensic Laboratory Integrated Management System 5 - Risk Management 6 - Quality in the Forensic Laboratory 7 - IT Infrastructure 8 - Incident Response 9 - Case Processing 10 - Case Management 11 - Evidence Presentation 12 - Sec…