Dinamika berbangsa dan bernegara Indonesia selama satu dekade terakhir tampak mengalami banyak perubahan yang mendasar. Yang paling kasat mata adalah adanya peningkatan kebebasan berpendapat dan berpartisipasi dalam hampir semua aspek penting dari pengelo- laan negara. Sebagian orang menyebutnya sebagai fenomena penguatan proses demokrasi. Proses ini pula yang antara lain diyakini bisa m…
Sekurang-kurangnya hadir dua perkara yang me- ngemuka ketika ‘ngobrol mengenai dokumentasi dan pendokumentasian seni budaya dengan orang- orang pemerintahan, yaitu: perkara politic of claim dan politic of access. Ungkapan yang sering muncul berkaitan dengan politic of claim, misalnya: “Tradi- si A atau B penting segera didokumentasikan, nanti keburu diklaim Malaysia (atau negara lain…
Earthquakes, tsunamis, floods, droughts, disease outbreaks as well as conflicts are all crises that result in death as well as profound disruption to those left behind, and to those communities who shelter them. Among the most urgent interventions are those to provide water, sanitation and hygiene {WASH) to affected communities. Water; Sanitation and Hygiene in Humanitarian Contexts presents …
Does the world really need another introductory textbook on feedback control? For many years we have felt that the many quality textbooks that currently exist are more than sufficient. However, several years ago the first author (RWB) had an experience that changed my mind, and the minds of my colleagues. I had just finished teaching the introductory feedback control course at BYU. I had a need…
Albert Camus seperti punya sihir tersendiri bagi para penulis Indonesia. Agak aneh, memang. Dia tak pemah mengutarakan problem yang layaknya jadi persoalan orang banyak di sini. Dia bukan seorang pemikir clan sastrawan yang setiap hari berpapasan dengan gelora clan keterpojokan manusia Dunia Ketiga, kecuali persen- tuhannya yang malang dengan situasi kolonial Aljazair.
It is impossible to quantify the effects certain individuals have on the planning and creation of a book. Whether it be guidance, direct intervention or just general support, it is inevitable that a task that at times appeared to be a lonely, individual chore was, nevertheless, reliant on a number of people who offered guidance, encouragement or support.
Penulis merancang buku ini dengan konsep templat (template) atau format atau pola yang dapat diacu dalam pembuatan bab metode penelitian dalam proposal atau laporan penelitian bidang ilmu politik di perguruan tinggi. Lebih khusus lagi menyediakan panduan sederhana bagi para mahasiswa, calon akademisi atau ilmuwan politik merancang penulisan metode penelitian yang menyelidiki topik ilmu po…
Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud
This collection of essays represents the past few years of my work in crosscultural communication. I first became interested in cross-cultural communication in a serious way in the spring of 1989 when, as an assistant to the president of the Society for Technical Communication (STC), I was at a board meeting and heard a call from Janice Hocker, the president, for the report of the Intecom deleg…
Introduction to Health and Safety at Work has quickly established itself, in its first six years, as the foremost text for students taking the NEBOSH National General Certificate. It is also of great value to those studying for level 3 N/SVQ, the IOSH Managing Safely Award and similar management and supervisor focused learning. It has become a significant work of reference for managers with hea…
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book.
This book provides an in-depth analysis of the Australian cybercrime landscape, covering the latest trends, tools, and tactics used by cybercriminals. The book also explores the steps being taken by Australian authorities and cybersecurity professionals to address these threats. Through theory, case studies, and real-world examples, this book offers a comprehensive overview of the challenges fa…
Counterintelligence refers to the efforts undertaken by intelligence agencies to prevent and detect attempts by foreign entities to gather sensitive or classifed information from a country's government, military, businesses, or other organizations. In the twentyfirst century, counterintelligence has become increasingly important as the world has become more connected through the internet and di…