Topik yang dibahas di buku ini akan memandu anda untuk membuat program Android dengan cepat dan mudah menggunakan Android Studio. Walopun terasa berat, spesifikasi hardware dengan menggunakan perangkat lunak Android Studio, tetapi Android Studio merupakan lingkungan terpadu resmi untuk membuat aplikasi Android.
Buku Pengantar Teknologi Informasi Edisi Revisi dapat anda dapatkan di toko buku Andi Publisher terdekat di kota anda, atau dibeli melalui website toko buku online kami. Buku ini dapat digunakan sebagai buku pendamping oleh mahasiswa pada mata kuliah Pengantar Teknologi Informasi pada berbagai program studi seperti Teknik Industri, Teknik Elektro, Teknologi Informasi, Teknik Informatika, Manaje…
Seiring dengan perkembangan dan pemanfaatan Teknologi Jaringan Telekomunikasi menunjukkan bahwa layanan yang digunakan oleh pengguna layanan telekomunikasi semakin beragam. Satah satunya adatai perkembangan dari teknologi jaringan telekomunikasi, dimulai dan konsep jaringan telekomunikasi sampai dengan jaringan cerdas yang berbasiskan ISDN dan ATM. Perkembangan dan teknologi jaringan telekomuni…
Creating, developing, and producing a text for an introductory course to information technology is a formidable undertaking. First of all, we would like to thank our students to whom this book is dedicated. We would like to reiterate our commitment to them and thank them for their feedback in improving this textbook.
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book.
Counterintelligence refers to the efforts undertaken by intelligence agencies to prevent and detect attempts by foreign entities to gather sensitive or classifed information from a country's government, military, businesses, or other organizations. In the twentyfirst century, counterintelligence has become increasingly important as the world has become more connected through the internet and di…
This book is about using data to understand how social media services are used. Since the advent of Web 2.0, sites and services that give their users the power to actively change and contribute to the services’ content have exploded in popularity. Social media finds its roots in early social networking and community communication services, including the bulletin board systems (BBS) of the 198…
Because of the increasing complexity and growth of real-world networks, their analysis by using classical graph-theoretic methods is oftentimes a difficult procedure. Thus, there is a strong need to combine graph-theoretic methods with mathematical techniques from other scientific disciplines, such as machine learning, statistics, and information theory, for analyzing complex networks more adeq…
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advanta…
The response to the first and second editions of Python Crash Course has been overwhelmingly positive. More than one million copies are in print, including translations in over 10 languages. I’ve received letters and emails from readers as young as 10, as well as from retirees who want to learn to program in their free time. Python Crash Course is being used in middle schools and high schools…
Data visualization is part art and part science. The challenge is to get the art right without getting the science wrong, and vice versa. A data visualization first and fore‐ most has to accurately convey the data. It must not mislead or distort. If one number is twice as large as another, but in the visualization they look to be about the same, then the visualization is wrong. At the same ti…
By the dawn of the new millennium, robotics has undergone a major transformation in scope and dimensions. This expansion has been brought about by the maturity of the field and the advances in its related technologies. From a largely dominant industrial focus, robotics has been rapidly expanding into the challenges of the human world. The new generation of robots is expected to safely and depe…
Humans are indispensable components in Cyber-Physical Systems (CPSs) due to their cognitive capacities and the ultimate goal to support rather than supersede humans. The close integration of humans, CPSs, and Artificial Intelligence (AI) creates AI-Powered Human-Cyber-Physical Systems (HCPSs) that drive the development of Industry 5.0 and revolutionize the future of work. Despite the remarkable…
This book will inform about wireless networking and around it
This book presents the fundamentals and advances in the field of data visualization and knowledge engineering, supported by case studies and practical examples. Data visualization and engineering has been instrumental in the development of many data-driven products and processes. As such the book promotes basic research on data visualization and knowledge engineering toward data engineering and…
Deep Learning with TensorFlow and Keras, Third Edition, is a concise yet thorough introduction to modern neural networks, artificial intelligence, and deep learning technologies designed especially for software engineers and data scientists. The book is the natural follow-up of the books Deep Learning with Keras [1] and TensorFlow 1.x Deep Learning Cookbook [2] previously written by the same…
Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia …
Data science is a rapidly growing field. While there is still a raging academic debate on the exact position of data science in between—or encapsulating—statistics, machine learning, and artificial intelligence, the number of data science programs offered at schools around the world is growing rapidly (Donoho 2017). It has to, since data scientists are among the most sought after people on …
The book strives to motivate intuition about simulation and modeling, as well as to present them in a technically correct yet clear manner. There are many examples and problems throughout, as well as extensive references to the simulation and related literature for further study.
This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus o…
A field that is not completely mature is a double-edged sword. On one edge, it offers a lot of opportunities for discovery and exploitation. There are many unsolved problems in deep learning. This translates into opportunities to be the first to market – be that in product development, publication, or recognition. The other edge is it would be difficult to trust a not-fully-understood field i…
Computer science undergraduates traditionally are required to take either a course in probability, typically taught by the math department, or a course in statistics, typically taught by the statistics department. A curriculum committee in my department decided that the curricula of these courses could do with some revision. So I taught a trial version of a course, for which I wrote notes; t…
Presents an application-focused and hands-on approach to learning, with supplementary teaching resources provided at an associated website Contains numerous study exercises and solutions, highlighted examples, definitions, theorems, and illustrative cartoons Includes chapters on predicate logic, PROLOG, heuristic search, probabilistic reasoning, machine learning and data mining, neural networks…
A career in computer science is a commitment to a lifetime of learning. You will not be taught every detail you will need in your career while you are a student. The goal of a computer science education is to give you the tools you need so you can teach yourself new languages, frameworks, and architectures as they come along. The creativity encouraged by a lifetime of learning makes computer s…