Dynamic Programming (lanjutan)
-> Knapsack 0/1
cth:
i = 1 2 3 4
w = 2 1 3 2
p = 12 10 20 15
M...
Wednesday, November 23, 2016
Week 11
Attack:
1. Cloned RFID
-> data numpang lewat doang ke komp org lain, tp data tsb dipake sm org lain tsb (disebut jg immigrant attack)
-> perbedaan dgn:
wire taping => wire taping cuma nyadap, sekedar tau data doang (cukstaw lol)
MITM => datanya...
Monday, November 21, 2016
Dynamic Programming
1. Fibonacci (coming soon!)
2. Koefisien Binomial
C(n, k) = C(n-1, k-1) + C(n-1, k) dimana n > k > 0
3. Coin Change (coming soon or coming never.. idk)
4. Binary Search Tree yang optimal
cth:
A = 0,1
B = 0,2
C = 0,4
D = 0,3
Subproblem {1,2} -> dlm hal ini A=1, B=2, dst, nilai ini merupakan nilai k
A -> B
Cost: 1 * 0,1 + 2 * 0,2 = 0,3
B -> A
Cost: 1* 0,2 + 2 * 0,1...
Insert, Update, Delete, Commit, Rollback, Truncate (Database)
DML:
1. Insert new Row
insert data bisa secara implisit dan eksplisit
implisit -> nama kolom disebutin
INSERT INTO TableSomething (ColA, ColB) VALUES(1, 2);
eksplisit ga sebutin nama kolom
INSERT INTO TbSomething VALUES (1, 2, NULL);
Insert data bisa dari table lain:
INSERT INTO TbA (SELECT x FROM...
Tuesday, November 15, 2016
Computer Security - Not All is What It Seems (Week 10)
Harm:
Forgeries (pemalsuan)
-> Fake Email
-> Fake Website
-> Fake Code, cth pdf reader fake, antivirus fake
Vulnerability:
-) Integrity Failure
Attack Details:
1. Website Defacement: mengubah konten sebuah web
2. Subtitute Content of Real Website: ubah sbagian kcl dr web, tujuan...