[PDF][PDF] Evolution of malware threats and techniques: A review
MN Alenezi, H Alabdulrazzaq… - International journal …, 2020 - researchgate.net
The rapid development of technology, and its usage, in our everyday lives caused us to
depend on many of the aspects it offers. The evolution of the Internet in recent decades has …
depend on many of the aspects it offers. The evolution of the Internet in recent decades has …
[PDF][PDF] The phenomenon of cyber-crime and fraud victimization in online shop
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts
from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …
from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …
[PDF][PDF] A review of security issues in SDLC
Software Engineers do not implement security as a continuing process in software
development; they give it worth at the end of software development. Security implementation …
development; they give it worth at the end of software development. Security implementation …
Cyber threat ransomware and marketing to networked consumers
Marketing is a process of creating, capturing, and exchanging 'value'for the mutual benefits
of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires …
of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires …
Prim and genetic algorithms performance in determining optimum route on graph
APU Siahaan - 2018 - osf.io
Performance is a process of assessment of the algorithm. Speed and security is the
performance to be achieved in determining which algorithm is better to use. In determining …
performance to be achieved in determining which algorithm is better to use. In determining …
[PDF][PDF] Modified Playfair Cipher Using Random Key Linear Congruent Method
The number of crimes that arise due to data does not have good security makes many users
choose one or more cryptographic algorithms to secure data. The application of …
choose one or more cryptographic algorithms to secure data. The application of …
Computer viruses, attacks, and security methods
MZ Hasan, MZ Hussain, Z Ullah - Lahore Garrison University …, 2019 - lgurjcsit.lgu.edu.pk
Abstract with the fast growth of the Internet, computer threats and viruses have become a
very serious issue for us, which attract public attention. Therefore, the distribution of …
very serious issue for us, which attract public attention. Therefore, the distribution of …
SOSIALISASI DAN KUNJUNGAN KAMPUS DALAM PROMOSI PROGRAM STUDI SISTEM KOMPUTER UNIVERSITAS PEMBANGUNAN PANCA BUDI DI SMK …
APU Siahaan - Jurnal Hasil Pengabdian Masyarakat …, 2023 - ejurnal.lkpkaryaprima.id
Kegiatan sosialisasi dan kunjungan kampus merupakan salah satu cara untuk
mempromosikan program studi Sistem Komputer Universitas Pembangunan Panca Budi …
mempromosikan program studi Sistem Komputer Universitas Pembangunan Panca Budi …
Pengenalan dan Sosialisasi Website Sistem Informasi Portal Mahasiswa di SMK Tritech Indonesia
APU Siahaan - Jurnal Hasil Pengabdian Masyarakat …, 2023 - ejurnal.lkpkaryaprima.id
Pendidikan memiliki peran utama dalam perkembangan individu dan kemajuan suatu
negara. SMK Tritech Indonesia, sebagai lembaga pendidikan yang berkomitmen tinggi …
negara. SMK Tritech Indonesia, sebagai lembaga pendidikan yang berkomitmen tinggi …
Implementation of super playfair in messaging
APU Siahaan, M Mesran, I Solihin - Proceedings of the Joint …, 2018 - books.google.com
Data is the essential thing in the world of communication. Text messaging is a way of
communicating that is sent in digital form. This message is very widely used in electronic …
communicating that is sent in digital form. This message is very widely used in electronic …