Modul I Konsep Dasar 1. Dasar-dasar sistem informasi dalam bisnis Bagian I: konsep dasar: Sistem informasi dalam bisnis Bagian II: konsep dasar: komponen sistem informasi 2. Bersaing dengan teknologi informasi Bagian I: dasar-dasar dari keuntungan strategis Bagian II: menggunakan teknologi informasi untuk keuntungan strategis Modul II Teknologi Informasi 3. Perangkat keras computer B…
Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…
1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…
Table of contents: 1. Personal development: speaking to an audience 2. Delivery, nonverbal communication and nerves 3. Choosing and using visual aids 4. Speaking as part of your course 5. Speaking as part of a group 6. Speaking as a student representative 7. Speaking at elections and meetings 8. Job searches and job interviews
Table of contents: Pt. I. WPANS and 802.15.4 1. Prologue: Wireless Personal Area Networks 2. Operation of the IEEE 802.15.4 Network Pt. II. Single-Cluster Networks 3. Cluster with Uplink Traffic 4. Cluster with Uplink and Downlink Traffic 5. MAC Layer Performance Limitations 6. Activity Management through Bernoulli Scheduling 7. Admission Control Issues Pt. III. Multi-cluster Netw…
Contents: 1. Introduction 2. Data Distribution Alternatives 3. Database Control 4. Query Optimization 5. Controlling Concurrency 6. Deadlock Handling 7. Replication Control 8. Failure and Commit Protocols 9. DDBE Security / By Bradley S. Rubin 10. Data Modeling Overview 11. Logical Data Models 12. Traditional DDBE Architectures 13. New DDBE Architectures 14. DDBE Platform Requi…
Created with today’s increasingly complex business and technology landscape in mind, COBIT 5 for Assurance can be used for many different purposes including: - Obtaining a view (based on COBIT 5 concepts such as the enablers) on current good practices on assurance - Learning how to use different COBIT 5 components and related concepts for planning, scoping, executing and reporting on vari…
Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…