Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading 1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers Chapter 2 Classical Encryption Techniques 2.1 Symmetric…
ABSTRAK Buku ini mengkaji dan memaparkan tentang perlindungan lisensi copyleft terhadap open source software di Indonesia. Perkembangan open source software diikuti dengan perkembangan model perjanjian lisensi salah satunya lisensi copyleft, yang di dominasi oleh GNU General Public Lisence yang diterbitkan oleh free software foundation. Tetapi tidak semua lisensi yang ada dapat menjamin kebera…
This edition of Digital Image Processing is a reflection of how the educational needs of our readers have changed since 2002. As is usual in a project such as this, progress in the field continues after work on the manuscript stops. One of the reasons why this book has been so well accepted since it first appeared in 1977 is its continued emphasis on fundamental concepts—an approach that, amo…
Contents: INTRODUCTION TO THE AES MATHEMATICAL BACKGROUND DESCRIPTION OF THE AES ALGEBRAIC PROPERTIES OF THE AES EQUATION SYSTEMS FOR THE AES ANALYSIS OF AES EQUATION SYSTEMS CLOSING REMARKS
Buku ini membahas administrasi sistem pada OS Linux RedHat secara tuntas dan lengkap. Pembahasan dimulai dari pengenalan secara umum tentang OS Linux, hingga ke Teknik pemakaian tool-tool pengelolaan sistem. Dengan membaca buku ini, diharapkan praktisi dan pembaca yang tertarik untuk mendalami bidang administrator sistem di Linux dapat menguasai Teknik-teknik pengelolaan sistem secara lebih mud…
A single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks Author approaches both network and system administration from the perspective of the principles that do not change on a day-to-day basis Shows how to discover customer needs and then use …
This book is organized to facilitate students’ comprehension of the uses and operational aspects of the computer and its associated peripheral equipment. To accomplish this end, the text has been subdivided into six units as follows
NETWORK ANALYSIS, ARCHITECTURE, AND DESIGN SECOND EDITION JAMES D. MCCABE 1 Introduction 1.1 Objectives 1 1.2 Preparation 1 1.3 Background 2 1.4 Overview of Analysis, Architecture, and Design Processes 4 1.4.1 Hierarchy and Interconnectivity 7 1.4.2 Importance of Network Analysis 8 1.4.3 Model for Network Analysis, Architecture and Design 16 1.5 A Systems Methodology 19 1.6 System D…