/home/dift7783/public_html/devperpus.difagroup.id/lib/SearchEngine/DefaultEngine.php:610 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\DefaultEngine"
SQL ⚙️: array:2 [ "count" => "select count(distinct b.biblio_id) from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select bt.biblio_id from biblio_topic as bt left join mst_topic as mt on bt.topic_id=mt.topic_id where mt.topic like ?))" "query" => "select b.biblio_id, b.title, b.image, b.isbn_issn, b.publish_year, mp.publisher_name as `publisher`, mpl.place_name as `publish_place`, b.labels, b.input_date, b.edition, b.collation, b.series_title, b.call_number from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select bt.biblio_id from biblio_topic as bt left join mst_topic as mt on bt.topic_id=mt.topic_id where mt.topic like ?)) order by b.last_update desc limit 10 offset 0" ]
Bind Value ⚒️: array:1 [ 0 => "%Jaringan -- Komputer%" ]
The subject of this book is the architecture of computer systems. Computer architecture is about the structure and operation of digital computers. Computer architecture is concerned with the operational methods of the hardware; with the services provided by operating system software; with the acquisition, processing, storage and output of data; and with the interaction between computer. Ther…
Buku ini hadir untuk membantu masyarakat khususnya pengguna teknologi informasi dalam menangani masalah keamnan jaringan. Buku ini disusun secara interaktif dan tahap demi tahap, sehingga pembaca dapat langsung membuat aplikasi keamanan jaringan yang telah disiapkan tanpa harus bertanya kepada instruktur.
this book explains to introduction of computer security concepts, the challenges of computer security, what is the the OSI security architecture, how can get security attacks, security services, security mechanisms, a model for network security, and some recommended reading, internet and web resources and key terms, review questions and problems.
Buku ini memberikan penjelasan tentang bentuk topologi ideal dan berbagai celah keamanan atau kerawanan pada suatu sistem informasi yang dapat di exploitasi oleh pihak-pihak yang tidak berwenang. Pembahasan mencakup keamanan perimeter, server aplikasi dan keamanan jaringan nirkabel serta penanganan suatu insiden keamanan informasi.
Buku ini memberikan penjelasan tentang bentuk topologi ideal dan berbagai celah keamanan atau kerawanan pada suatu sistem informasi yang dapat di exploitasi oleh pihak-pihak yang tidak berwenang. Pembahasan mencakup keamanan perimeter, server aplikasi dan keamanan jaringan nirkabel serta penanganan suatu insiden keamanan informasi.