Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2318 dokumen yang sesuai dengan query
cover
Harrington, Steven
New York: McGraw-Hill, 1983
001.553 HAR c
Buku Teks SO  Universitas Indonesia Library
cover
Parent, Rick
Waltham, MA : Elesevier, 2012
006.696 PAR c
Buku Teks SO  Universitas Indonesia Library
cover
Shimonski, Robert
Waltham, MA: Syngress, 2012
005.8 SHI c
Buku Teks SO  Universitas Indonesia Library
cover
Audun Josang, editor
"This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management."
Berlin: Springer, 2012
e20406998
eBooks  Universitas Indonesia Library
cover
Vladutiu, Mircea
"The subject of this book is the analysis and design of digital devices that implement computer arithmetic. The book's presentation of high-level detail, descriptions, formalisms and design principles means that it can support many research activities in this field, with an emphasis on bridging the gap between algorithm optimization and hardware implementation. The author provides a unified view linking the domains of digital design and arithmetic algorithms, based on original formalisms and hardware description languages.
A feature of the book is the large number of examples and the implementation details provided."
Berlin: [, Springer-Verlag ], 2012
e20408683
eBooks  Universitas Indonesia Library
cover
Ramin Sadre, editor
"This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security."
Heidelberg: [, Springer], 2012
e20409186
eBooks  Universitas Indonesia Library
cover
"Contents :
- Table of Contents by Author
- Acronym Guide
- OSS: A Strategic Weapon for Data CLECs in Challenging Conditions
- Bundled Communications Services: Creating Higher Margins, Lower Costs, and
Faster Speeds to Market
- The Need for Next-Generation OSS
- Business-Aware Contracts and the Shared-Data Model
- The Troubled CLEG: Causes, Symptoms, and Solutions
- Market View of Customer-Self-Service Management
- Delivering an NGN OSS
- Generating Revenue in a CDMA 2000 Environment
- Redefining the OSS Value Proposition
- Driving CLEC Business Intelligence for Competitive Edge and ROI
- Deploying Best-of-Breed Components
- How to Manage Telco Supply-Chain Partners
- OSS for Managing Next-Generation Networks
- Winning the OSS Wars: Making the Carrier/Vendor Partnership Work
- Mergers and Acquisitions
- Mergers and Acquisitions: Making Them Work
- Integrating DSL Loop Management into Service Providers' Back-Office Systems
- Service Management of MPLS VPNs
- link-Monitoring Systems Come of Age
- OSS Integration Approaches
- Technology-Neutral Architecture
- NSP Data Marts: A New Approach to Solving OSS Integration Problems
- Streamlining Operations for Service Providers in the Next-Generation Network
Infrastructure
- The Quick Fix? When a Billing System Needs a Patch1
- Flow-through Integrated Operations Solutions
- Operations Architecture for Data-Centric Converged Telecommunications Networks
- Process Flow in Service-Delivery Solutions
- Complexity of New Network Architectures Creates SS7 Management Challenges
- A Repeatable Approach to Successful Billing System Conversions
- Ubiquitous Bus Technology
- Functional Architecture: The TeleManagement Forum's Telecom Operations Map
- Centralized Network-Performance Monitoring
- Service Provisioning and Network-Inventory Management
- IP-Telephony OSS for Real-World Success
- Service Assurance: Empowering Operational Excellence
- VPN Performance Management
- Maintaining Quality of Service
- Defining "Carrier Grade"
- Take the Proactive Approach to Revenue Assurance
- OSS Package Selection
- Service Differentiation
- Network Outages and Quality
- Creating Value in Broadband Cable with CRM
- Quality of Service for Wireless Networks
- Cable Broadband Service Management: Case Studies of Workflow
Implementations
- Wireless-Network Benchmarking and Improvement Strategies
- Service Fulfillment for the Evolution of Cable Broadband: A New Generation
- OSS Challenges for Multiple Broadband Service Integration
- Optical Networks Find OSS1
- Choosing the Best OSS is Key to DSL Service Providers' Success
- Service-Provider Environment and IP Service Assurance
- Optimizing GSM Networks to Achieve Performance and Capacity Goals at Minimum
Cost
- Implementing Mobile Self-Care and Other Mobile Applications
"
Chicago: International Engineering Consortium, 2001
e20448060
eBooks  Universitas Indonesia Library
cover
Wozniak, Steve, 1950-
London: Headline/​Review, 2007
621.390 92 WOZ i
Buku Teks  Universitas Indonesia Library
cover
Katz, Jonathan, 1974-
"ryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/​ECDSA and DHIES/​ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study."
Boca Raton: CRC Press, 2015
005.82 KAT i
Buku Teks SO  Universitas Indonesia Library
cover
London: Academic Press, 2017
004.019 EMO
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>