Sebanyak 76 item atau buku ditemukan

Inspirasi Nama Bayi Islami Terpopuler

Islam mengajarkan kepada para orang tua untuk memberikan nama yang baik kepada buah hati mereka. Lewat sebuah nama tersemat sekuntum doa kebaikan. Dengan nama pula, setiap individu memiliki identitas, ciri, atau tanda. Nama menghindarkan seseorang menjadi tidak dikenal (majhul). Sama seperti Allah SWT yang indah dan menyukai keindahan, maka baguskanlah namamu. Buku ini menjadi persembahan dan bekal pengetahuan sekaligus kado istimewa bagi setiap orang tua dalam memberikan sebentuk nama kepada anak-anak mereka. Harapannya, nama terpuji yang diberikan kepada sang buah hati bisa menjadi al-ismu du’aa (nama adalah doa). InsyaAllah. Buku dari Gradien Mediatama ini berisikan kumpulan nama - nama Islami yang indah dan baik untuk anak anda

Khalafi Azzam Ar Rafif: Anak laki-laki yang bagus, berkemauan baik, dan
berakhlak mulia. Khalaf : anak yang baik/bagus Azzam : berkemauan baik Rafif :
berakhlak mulia Khalafi Fadhil Ar Rasyiq: Anak laki-laki yang baik, kuat, dan
mulia.

Materi muatan lokal kebudayaan Banjar

muatan lokal

Local cultures of Banjar people in Kalimantan Selatan, Indonesia; proceedings of a congress.

254 ini dilaksanakan secara berjamaah dalam sebuah langgar atau masjid
Pergaulan dalam arena keagamaan ini tata kelakuan yang berlaku sama, yaitu
selalu menghormati yang lebih tua. Di dalam melaksanakan ibadah bersama
harus ...

Memori pelaksanaan tugas Gubernur Kepala Daerah Tingkat I Kalimantan Selatan, Subardjo dari tahun 1970 s

Keputusan Gubernur Kdh. Tk. I Kalimantan Selatan Nomor X-1-1/SK/1973,
tentang Susunan Organisasi dan Tata Kerja Dinas Perikanan Propinsi Daerah Tk
. I Kalimantan Selatan. Keputusan Gubernur Kdh. Tk. I Kalimantan Selatan No.

Stylistics in a Second Language Context

In most institutions, thee study of second language literary works has become a dead exercise of learning facts, figures and critical opinions about those works. The author feels that the judicious use of approaches suggested in stylistics would help second language students to judge things for themselves in a context not naturally attuned to the underlyng assumptions of that likterature. These 'things' would include the use of language, thus helping the ESL learner to develop an understanding of the dynamics of the language

Man is constantly using language-spoken language, written language, printed
language-and it is through language that man is linked with other human beings.
Hence the Sociology of Language (or Socio-linguistics) examines the interaction
 ...

Second-language Speech

Structure and Process

This work provides a cross-section of current research on second-language speech. Issues covered include: the influence of the first language; the contexts of speech-sounding learning; the perception-production relation; the nature of speech language capacity.

One of the fundamental goals of theoretical linguistics is to make explicit the
language learner's internalized grammar. To this end, the study of an inter-
language phonology - particularly a foreign accent - is a way to investigate and
uncover a ...

Green Information Technology

A Sustainable Approach

We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact. Introduces the concept of using green procurement and supply chain programs in the IT infrastructure. Discusses how to use big data to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Explains how cloud computing can be used to consolidate corporate IT environments using large-scale shared infrastructure reducing the overall environmental impact and unlocking new efficiencies. Provides specific use cases for Green IT such as data center energy efficiency and cloud computing sustainability and risk.

Green Information Technology: A Sustainable Approach offers, in a single
volume, a broad collection of practical techniques and methodologies for
designing, building, and implementing a green technology strategy in any large
enterprise ...

Information Technology Management in Developing Countries

The IT revolution has affected the entire world by producing a new, Internet-based, digital economy. The challenges faced by developing countries in hamessing the full potential of IT are not really very different from those that confronted the U.S. in its journey toward the Internet economy. Information Technology Management in Developing Countries discusses the possible pitfalls and triumphs involved when implementing this entity into the structure of a developing country.

Firstly the incremental force of technology as illustrated by the growth stage
model of the development of Information and Communication Technology (ICT) is
flawed. This model implies a linearity of development and an inevitability of stage
 ...

A Multidisciplinary Introduction to Information Security

With most services and products now being offered through digital communications, new challenges have emerged for information security specialists. A Multidisciplinary Introduction to Information Security presents a range of topics on the security, privacy, and safety of information and communication technology. It brings together methods in pure mathematics, computer and telecommunication sciences, and social sciences. The book begins with the cryptographic algorithms of the Advanced Encryption Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains the mathematical reasoning behind public key cryptography and the properties of a cryptographic hash function before presenting the principles and examples of quantum cryptography. The text also describes the use of cryptographic primitives in the communication process, explains how a public key infrastructure can mitigate the problem of crypto-key distribution, and discusses the security problems of wireless network access. After examining past and present protection mechanisms in the global mobile telecommunication system, the book proposes a software engineering practice that prevents attacks and misuse of software. It then presents an evaluation method for ensuring security requirements of products and systems, covers methods and tools of digital forensics and computational forensics, and describes risk assessment as part of the larger activity of risk management. The final chapter focuses on information security from an organizational and people point of view. As our ways of communicating and doing business continue to shift, information security professionals must find answers to evolving issues. Offering a starting point for more advanced work in the field, this volume addresses various security and privacy problems and solutions related to the latest information and communication technology.

At this point in the protocol, Alice and Bob share classical information with high
but not 100% correlation, and assume that the third party Eve has partial
knowledge of this information. This problem can be solved by classical
information theory, ...

Introduction to Information and Computer Literacy

With Microsoft Windows 95 and Microsoft Office 97

Learn the essentials to Microsoft Windows 95™ and Microsoft Office 97™ in this introductory and easy to understand guide. Topics covered are: the hardware of your computer, Word Processing, document creation, and the applications contained in Office 97.

I-Iowever, and whenever, you use it, please remember that it will be quite some
time before all of the references and information you need can be found on the
Internet. While a lot of information is available on the Internet today, and more is ...