Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…
Contents: Section 1 Information hiding for audio and speech Chapter 1 Information hiding for audio and signals Chapter 2 Reversible audio data hiding in spectral and time domains Chapter 3 Method of digital-audio watermarking basec on cochlear delay characteristics Chapter 4 Information hiding using interpolation for audio and speech signals Chapter 5 Acoustic OFDM technology ans …
Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…
Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…
RESEARCH DESIGN PENDEKATAN KUALITATIF, KUANTITATIF, DAN MIXED EDISI KETIGA JOHN W. CRESWELL BAGIAN SATU: PERTIMBANGAN-PERTIMBANGAN AWAL 3 Bab Satu: Memilih Rancangan Penelitian 3 Tiga Jenis Rancangan 6 Tiga Komponen Penting dalam Rancangan Penelitian 6 Beberapa Pandangan-Dunia Filosofis 8 Pandangan-Dunia Post-Positivisme 11 Pandangan-Dunia Konstruktivisime Sosial 13 Pandangan-Dunia Adv…
Daftar isi: Bab I Pemrograman berorientasi objek 1.1 Mengapa pemrograman berorientasi objek? 1.2 Pendekatan terstruktur 1.3 Pendekatan berorientasi objek 1.4 Perkembangan teknik pemrograman 1.5 Bahasa pemrograman C# 1.6 Bahasa pemrograman C# dan framework .NET Bab II Analisis dan perencanaan sistem 2.1 Sasaran pengembangan perangkat lunak 2.2 System Development Life Cycle (S…
DAFTAR ISI Bab 1 Mengenal PHP, OOP, PDO, MVC dan Ajax 1.1. PHP 1.2. OOP 1.3. PDO 1.4. MVC 1.5. Ajax 1.6. Mengenal Javascript Bab 2 Teori OOP dalam PHP 2.1. Class dan objek 2.2. Properti dan method 2.3. Cara mengakses objek 2.4. Fungsi variabel $this 2.5. Argumen dalam method 2.6. Constructor dan destructor 2.7. Inheritance 2.8. Encapsulation 2.9. Scope resolution operator …
DAFTAR ISI Bab 1 Pendahuluan 1.1. Cypherpunk 1.2. Uang 1.3. Basis data 1.4. Kriptografi Bab 2 Blockchain 2.1. Gambaran umum 2.2. Konsensus 2.3. Tipe blockchain 2.4. Keamanan Bab 3 Bitcoin 3.1. Sejarah bitcoin 3.2. Satoshi Nakamoto 3.3. Desentralisasi 3.4. Definisi bitcoin 3.5. Suplai terbatas 3.6. Transaksi bitcoin 3.7. Dompet bitcoin 3.8. Bitcoin blockchain explorer 3…