::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 2290 dokumen yang sesuai dengan query
cover
Constable, Robert L., editor
This Festschrift volume is published in honor of Dexter Kozen on the occasion of his 60th birthday. Dexter Kozen has been a leader in the development of Kleene Algebras (KAs). The contributions in this volume reflect the breadth of his work and influence. The volume includes 19 full papers related...
Berlin : [Springer-Verlag, ], 2012
e20410510
eBooks  Universitas Indonesia Library
cover
Mano, M. Morris, 1927-, author
Singapore : Pearson Education , 2016
621.392 MAN l
Buku Teks  Universitas Indonesia Library
cover
Steimle, Jurgen, author
This book provides the first theoretical interaction model of pen-and-paper user interfaces and an integrated set of interaction techniques for knowledge workers. The model proposes a ‘construction set’ of core interactions that are helpful in designing solutions that address the diversity of pen-and-paper environments. The interaction techniques, concrete instantiations of...
Berlin: [Springer, ], 2012
e20419883
eBooks  Universitas Indonesia Library
cover
Sanders, Chris, author
Applied network security monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails....
Waltham, MA: Syngress, 2014
e20426799
eBooks  Universitas Indonesia Library
cover
Akhgar, Babak, editor
Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories...
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Vacca, John R., editor
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Bates, Martin, author
Interfacing PIC microcontrollers, is a great introductory text for those starting out in this field and as a source reference for more experienced engineers. Martin Bates has drawn upon 20 years of experience of teaching microprocessor systems to produce a book containing an excellent balance of theory and practice with...
Oxford, UK: Newnes, 2014
e20427007
eBooks  Universitas Indonesia Library
cover
Barker, V. A., 1934-, author
LAPACK95 is a Fortran 95 interface to the Fortran 77 LAPACK library. It is relevant for anyone who writes in the Fortran 95 language and needs reliable software for basic numerical linear algebra. It improves upon the original user-interface to the LAPACK package, taking advantage of the considerable simplifications that...
Philadelphia : Society for Industrial and Applied Mathematics, 2001
e20442909
eBooks  Universitas Indonesia Library
cover
Komzsik, Louis, author
The Lanczos Method: Evolution and Application is divided into two distinct parts. The first part reviews the evolution of one of the most widely used numerical techniques in the industry. The development of the method, as it became more robust, is demonstrated through easy-to-understand algorithms. The second part contains industrial...
Philadelphia: Society for Industrial and Applied Mathematics, 2003
e 20443320
eBooks  Universitas Indonesia Library
cover
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative. This has resulted in the development of the notion of a ?trusted platform?, the main feature of which is the possession of a trusted hardware element capable...
London: Institution of Engineering and Technology, 2008
e20452623
eBooks  Universitas Indonesia Library