This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptogra…
Teknologi Big data & Artificial Intelligence (AI) sub study Data Science & bagian vital Revolusi industri 4.0 semakin banyak dibaca dan juga ditulis di buku ini, oleh Akademisi, Profesional Muda, Aparatur Pemerintah (ASN) & Eksekutif yang mendorong Transformasi digital dari Startup hingga BUMN dan Unicorn, bahkan Decacorn. Buku Wajib bagi Digital Native Milenia yang dari sejak lahir (digital…
ABDI mengundang penulis dan pakar dari dalam dan luar negeri yang peduli terhadap kemajuan ilmu pengetahuan dan tingginya adaptasi dan adoptasi teknologi Industri 4.0 di Indonesia oleh Masyarakat Indonesia. Presiden Jokowi juga menekankan pentingnya penguasaan teknologi Al, Data Science, Cyber Security hingga Metaverse, oleh bangsa Indonesia, karena perubahan semakin masif, cepat dan perubahan …
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorizatio…
Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…
Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpri…