Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 8 dokumen yang sesuai dengan query
cover
Jihong Yu
Abstrak :
This book provides a comprehensive treatment of the theoretical foundation and algorithmic tools necessary in the design of efficient tag counting and monitoring algorithms in emerging RFID systems. The book delivers an in-depth analysis on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: Stability analysis of the frame slotted Aloha protocol, the de facto standard in RFID tag counting and identification; Tag population estimation in dynamic RFID systems; Missing tag event detection in the presence of unexpected tags; Missing tag event detection in multi-group multi-region RFID systems. The target readers are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on RFID systems and their applications.
Switzerland: Springer Cham, 2019
e20501283
eBooks  Universitas Indonesia Library
cover
London: BTexact Technologies, 2002
005.8 INT
Buku Teks  Universitas Indonesia Library
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks  Universitas Indonesia Library
cover
Goncalves, Marcus
New York: McGraw-Hill, 2000
R 005.8 GON f
Buku Referensi  Universitas Indonesia Library
cover
Andress, Jason
Abstrak :
Summary : The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher. Contents Machine generated contents note: Introduction What is Information Security? Identification and Authentication Authorization and Access Control Auditing and Accountability Cryptography Legal and Regulatory Issues Operations Security Human Element Security Physical Security Network Security Operating System Security Application Security.
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
Stallings, William
London: Pearson Education, 2003
005.8 STA c
Buku Teks  Universitas Indonesia Library
cover
Miller, David R.
Indianapolis: Wiley, 2011
005.8 MIL s
Buku Teks  Universitas Indonesia Library