Studi kasus dikemas sedemikian rupa sehingga bisa menjelaskan setiap tahapan proyek yang harus dilalui dalam suatu rangkaian manajemen proyek yang komprehensif (menyeluruh) dan terintegrasi (terpadu). Penulis mengemasnya dalam bentuk contoh praktis dan implementatif. Perlu digarisbawahi bahwa template ini bukanlah bentuk baku dalam manajemen proyek. Anda boleh mengubahnya sesuai kebutuhan proye…
Creating, developing, and producing a text for an introductory course to information technology is a formidable undertaking. First of all, we would like to thank our students to whom this book is dedicated. We would like to reiterate our commitment to them and thank them for their feedback in improving this textbook.
Now we are going to cover basic terms before going deep into the GNOME desktop environment such as GNU/Linux, Open Source, Free Software, GUI, TUI, CLI, and so on.
Data structures and algorithms is a fundamental course in computer science, which most undergraduate and graduate programs in computer science and other allied disciplines in science and engineering offer during the early stages of the respective programs, either as a core or as an elective course. The course enables students to have a much-needed foundation for efficient programming, leading t…
Since the seminal book “Software Ecosystem” by Messerschmitt and Szyperski in 2003, software ecosystems have become a very active topic of research in software engineering. As the different chapters of this book will reveal, software ecosystems exist in many different forms and flavors, so it is difficult to provide a unique encompassing definition. But a key aspect of such software ecosyst…
The secure state of an operating system or service is the result of a layered security approach. Systems can be shielded from the outside world through firewalls, operating systems have to be kept up to date with the latest security patches, services have to be configured properly, separation of duties has to be implemented for end users, and so forth. Access controls are another layer that adm…
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book. …
Mobile security is one of the hottest topics today. Android being the leading mobile operating system in the market, it has a huge user base, and lots of personal as well as business data is being stored on Android mobile devices. Mobile devices are now sources of entertainment, business, personal life, and new risks. Attacks targeting mobile devices and apps are on the rise. Android, being the…
Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. Taking no prisoners and leaving no stone unturned, the book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investig…
Welcome, and thank you for taking a look at this book! Unlike the vast array of networking books written by geeks for geeks, this book was written for you and for anyone who wants to understand the computer networking phenomenon that has taken the world by storm. (In other words, it’s by geeks for nongeeks.) We understand that the vast majority of people working in this industry are not n…
The number of internet users has increased dramatically during the last few decades. The improvement in internet speed and the drop in the price of using it has contributed to this expansion. With the advent of the internet, billions of individuals are now able to go online. The growth of the internet has given rise to a number of new industries, like social media and online financial services,…
Cloud computing and big data are two emerging paradigms in the recent developments of information technology. The big data paradigm is applied to complex data and to the dataset whose size is beyond the competency of traditional computing services. Due to the innovation of big data, this technology is exposed to vulnerabilities, new risks, and threats due to a substantial volume of data and als…
Network administrators of all backgrounds share one underlying, overwhelming desire. It doesn’t matter if you manage a network with 400 separate manufacturing plants connected by a global MPLS mesh or if you’re responsible for three computers and an elderly printer. Network administrators all share an abiding and passionate desire for just one thing: We want our users to shut up.
This book uses Drupal, a powerful and extendable Content Management System (CMS), to set up and manage a social networking web site using a range of powerful and feature-rich social networking modules that are available. By using Drupal, the site can be built and extended rapidly, and changed easily, as the social network evolves and grows.
This book is a complete discussion of state-of-the-art technology used in identification, acquisition, and forensic analysis of mobile devices with the iOS operating system, and it has been extended and updated to iOS 8 and 9. It is a practical guide that will help investigators understand how to manage scenarios efficiently during their daily work on this type of mobile device. The need for a …
Most people don’t need much convincing to use Excel, Microsoft’s premier spreadsheet software. Its overwhelming popularity, especially in the business world, makes it the obvious choice for millions of number crunchers. But despite its wide use, few people know where to find Excel’s most impressive features or why they’d want to use them in the first place. Excel 2010: The Missing Manua…
In the early 1990s, I could not find a textbook from which to teach an Issues in Environmental Pollution course. So began the writing of class notes, added to by student concerns, misunderstandings, questions, and an ever-increasing volume of information on the issues. The result was the text, Understanding Environmental Pollution. It summarizes the basics of many pollution issues, using langua…
This book is about computer programming. Programming is a way of conceiving and embracing the unknown. At its best, programming goes beyond developing commercial applications. It becomes a way of exploring and mapping other ways of thinking. It is the means by which one can simulate, extend, and experiment with principles, rules, and methods of traditionally humandefined theories. In developing…
This book is a part of the comprehensive series Current Developments in Biotechnology and Bioengineering (Editor-in-Chief: Ashok Pandey), comprising nine volumes, and presents a collection of chapters dealing with solid waste management. According to a World Health Organization report, world cities alone currently generate about 1.3 billion tonnes of solid waste per year, and this figure is pre…
Fifteen years ago, the average computer user spent most of his or her time using productivity applications such as Microsoft® Word or Microsoft Excel®. In the ensuing years, users have become more sophisticated, network implementations have become the rule rather than the exception, and collaboration has become a key facet of a successful business strategy. Perhaps the most signifi cant chang…
Cyber security is a topic that cuts across pretty much every area of life. Government, healthcare, politics, fashion, sports, the media, big business, small business, charities, education – you name it, it is affected by cyber security. It is a fascinating, challenging, fast-paced field that changes every day, but at the same time is concerned with issues that have been a part of human life f…
This book will inform about computer organization
The world of cybersecurity happens to be very dynamic. As technology progresses, the field witnesses novel innovations in the forms of offensive tools and defensive mechanisms that make it a constant battleground, where the fight between red teams and blue teams ensues habitually and often on a large scale. As a cybersecurity researcher, I have always been intrigued by what is allowed and what …
This textbook focuses on: (i) the continuum of the environment— namely the earth, water, and atmosphere, epitomized by the term “Environmental Science”; and (ii) science-based aspects of the pollution of the environment. Thus, this textbook is designed to provide a scientific basis that will allow for prudent decisions to be made to manage and mitigate pollution throughout the environment…
Risk is a part of everyday life, and even quite straightforward businesses can have a range of ‘hazards’. You are not expected to eliminate all risk. What you must do is make sure you know about the main risks that affect you, and what you need to do to manage them responsibly.
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
Today’s researchers estimate that application programming interface (API) calls make up more than 80 percent of all web traffic. Yet despite their prevalence, web application hackers often fail to test them. And these vital business assets can be riddled with catastrophic weaknesses. As you’ll see in this book, APIs are an excellent attack vector. After all, they’re designed to expose in…
A secure development lifecycle (SDL) consists of activities that strengthenan application or product’s security posture during the software development lifecycle (SDLC). This can also be known as a secure software development lifecycle (SSDL, SSDLC, S-SDLC) or Secure Software Development Framework (SSDF). However you call it, its main goal is to augment an SDLC such as waterfall, Agile (e.g.,…
Large-scale video networks are becoming increasingly important for a wide range of critical applications such as video surveillance, the monitoring of disaster zones and traffic, elderly care, the tracking of people and vehicles in crowded environments, and the acquisition of more realistic images for consumer electronics and entertainment. In most of these applications, multiple sensors such a…
Financial Products provides a step-by-step guide to some of the most important ideas underpinning financial mathematics. It describes and explains interest rates, discounting, arbitrage, risk neutral probabilities, forward contracts, futures, bonds, FRA and swaps. It shows howto construct both elementary and more complex (Libor) zero curves. Options are described, illustrated and then priced us…
The field of Distributed Computing covers “all aspects of computing and information access across multiple processing elements connected by any form of communication networks, whether local or wide-area in the coverage”. Since the advent of the Internet in the 1970s, there has been a steady growth of new applications requiring distributed processing. This was enabled by advances in networki…
As cybersecurity threats keep growing exponentially in scale, frequency, and impact, legacy-based threat detection systems have proven inadequate. This has prompted the use of machine learning (hereafter, ML) to help address the problem. But as organizations increasingly use intelligent cybersecurity techniques, the overall efficacy and benefit analysis of these ML-based digital security system…
Optimization is a subject that is widely and increasingly used in science, engineering, economics, management, industry, and other areas. It deals with selecting the best of many possible decisions in real-life environment, constructing computational methods to find optimal solutions, exploring the theoretical properties, and studying the computational performance of numerical algorithms implem…
Global cyberspace is made of complex, multi-layered information networks which encompass the communication networks of the public sector, business community, security authorities and control and monitoring systems used by industry and critical infrastructure which, by means of the Internet, create a worldwide network. Imaginative data processing and utilization, arising from the needs of citize…
The need for more and more bandwidth forces us to think of more granularity. The best promising solution is to use Wavelength Division Multiplexing (WDM) all-optical networks in core networks. Note that an optical network that uses optical transmission and keeps optical data paths through the nodes from source to destination is called all-optical network.
The subjects and disciplines of chemistry and chemical engineering have encountered a new landmark in the way of thinking about, developing, and designing chemical products and processes. This revolutionary philosophy, termed green chemistry and chemical engineering, focuses on the designs of products and processes that are conducive to reducing or eliminating the use and generation of hazardou…
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either a Catalyst 6500 series chassis or a 7600 series router chassis. The “tight” integration with a chassis offers increased flexibility, especially with network virtualization and the incredible throughput that is no…
Times have changed. Computer programming has become much easier, and even so-called normal people now engage in this activity — and even admit it to friends and family. Programming simply means developing instructions that the computer automatically carries out. Excel programming refers to the fact that you can instruct Excel to automatically do things that you normally do manually — saving…
This book will inform about Environmental and health risk assessment and management