Daftar Isi Bab 1. Pengantar kriptografi 1.1. Pengertian kriptografi 1.2. Sejarah kriptografi 1.3. Mekanisme kriptografi 1.4. Evaluasi Bab 2. Sistem kriptografi 2.1. Sistem kriptografi (cryptosystem) 2.2. Keamanan cryptosystem 2.3. Penggunaan cryptosystem 2.4. Evaluasi Bab 3. Dasar pemrograman MATLAB dan pengolahan citra 3.1. Dasar pemrograman MATLAB 3.2. Dasar pengolahan citr…
Table of contents: Digital investigation foundations Computer foundations Hard disk data acquisition Volume analysis PC-based partitions Server-based partitions Multiple disk volumes File system analysis FAT concepts and analysis FAT data structures NTFS concepts NTFS analysis …
Table of contents: 1. Preface 2. Disclaimer 3. Author 4. The cell phone 5. Digital camera forensics 6. The PDAs and digital forensics 7. GPS devices 8. Corporate investigations on a netbook 9. Cell phone investigations by police 10. Recovering existing or deleted data from USB devices 11. Places to work at investigating mobile devices 12. References 13. …
Daftar isi: Bab 1 Pendahuluan Bab 2 Array dan string Bab 3 Struktur Bab 4 Subprogram dan rekursi Bab 5 Sorting Bab 6 Searching Bab 7 Stack Bab 8 Queue Bab 9 Pointer dan linked list Bab 10 Evaluasi
Terdapat bibliografi dan indeks.
1. A C++ Primer.
1.1 Basic C++ Programming Elements.
1.2 Expressions.
1.3 Control Flow.
1.4 Functions.
1.5 Classes.
1.6 C++ Program and File Organization.
1.7 Writing a C++ Program.
1.8 Exercises.
2. Object-Oriented Design.
2.1 Goals, Principles, and Patterns.
2.2 Inheritance and Polymorph…
Table of Contents 1. Introduction Abstract 1.1 Open collaborative human summarization 1.2 The necessity of automatic text summarization 1.3 Practice in search engines 1.4 Practice in e-science: summarizing multiple scientific papers through citation 1.5 A multi-dimensional perspective of summarization literature 1.6 Character…
Table of Contents 1. Facing the Cybercrime Problem Head-on 2. Emerging Cybercrime Techniques 3. Understanding the People on the Scene 4. The Computer Investigation Process 5. Acquiring Data, Duplicating Data, and Recovering Deleted Files 6. Understanding Network Intrusions and Attacks 7. Understanding Cybercrime Prevention 8. Implementing Cybercrime Det…
Table of Contents Ch. 1. Computer forensics in today's world Ch. 2. Digital forensics: an overview Ch. 3. Developing an enterprise digital investigative/electronic discovery capability Ch. 4. Integrating a quality assurance program in a digital forensic laboratory Ch. 5. Balancing e-discovery challenges with legal and IT requirements Ch. 6. Forensic software and hardware Ch. 7. Incide…
Table of Contents About the Authors Foreword Preface Introduction Chapter 1: General principles of cyber guerilla Abstract Introduction The essence of cyber guerilla Cyber guerilla strategy Cyber guerilla tactics Cyber warfare on favorable terrain (When to wage guerilla) Cyber warfare on unfavorable terrai…
Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…