Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11116 dokumen yang sesuai dengan query
cover
"Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.
"
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
cover
Maiwald, Eric
New York: McGraw-Hill Technology Education, 2004
005.8 MAI f
Buku Teks SO  Universitas Indonesia Library
cover
Panko, Raymond R.
New Jersey : Prentice-Hall, 2004
005.8 PAN c
Buku Teks SO  Universitas Indonesia Library
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Kizza, Joseph Migga
Cham: Springer, 2017
005.8 KIZ g
Buku Teks SO  Universitas Indonesia Library
cover
Kizza, Joseph Migga
"We will focus on these three components in a computer network. But what is a computer network? The reader should be aware that our use of the phrase computer network , from now on, will refer to the traditional computer network.
A computer network is a distributed system consisting of loosely coupled computers and other devices. Any two of these devices, which we will from now on
refer to as network elements or transmitting elements without loss of generality, can
communicate with each other through a communication medium. In order for these connected devices to be considered a communicating network, there must be a set of communicating rules or protocols each device in the network must follow to communicate with another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short."
London: Springer-Verlag , 2015
e20528512
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control."
Berlin: Springer, 2012
e20407128
eBooks  Universitas Indonesia Library
cover
Yudha Kristanto
"Dalam melakukan pengembangan jaringan saat ini keamanan jaringan adalah suatu bagian yang amat penting yang harus diperhatikan, Keamanan jaringan komputer sebagai bagian dari sebuah sistem sangat penting untuk menjaga validitas dan integritas data serta menjamin ketersediaan layanan bagi penggunanya.Dimana sebuah sistem harus dilindungi dari segala macam serangan dan bentuk usaha-usaha penyusupan atau pemindaian oleh pihak yang tidak berhak. Untuk itu diperlukannya sebuah pengembangan sistim penanaganan terhadap bahaya serangan yang dilakukan oleh orang yang tidak berhak didalam jaringan.
Perancangan IDPS (Intrusion Detection Prevention System )yang digunakan pada penulisan ini adalah perancangan yang berbasiskan pada software SNORT yang awalnya berupa IDS (Intrusion Detection System ) kemudian dikembangkan menjadi software IDPS (Intrusion Detection Prevention System) yang memiliki kemampuan dalam melakukan prevention terhadap jaringan. Yang dapat menahan menahan pengujian yang dilakukan oleh yaitu : Ip Scanning , Port Scanning ,OS Finger Printing, Vulnerability Scanning dan Flooding.

In developing this network when network security is a very important part that must be considered, computer network security as part of a system is very important to maintain the validity and integrity of data and ensure availability of services for user. When a system must be protected from all kinds of attacks and forms of intrusion attempts or scanning by unauthorized parties. Therefore the need for a development system to the danger handling attacks carried out by unauthorized people in the network.
The design of IDPs (Intrusion Detection Prevention System) used in this paper is based on the software design which was initially in the form of Snort IDS (Intrusion Detection System) and then developed into a software IDPs (Intrusion Detection Prevention System) which has the ability to do prevention on the network. That can withstand tests conducted by that is: Ip Scanning, Port Scanning, OS Finger Printing, Scanning Vulnerability and Flooding.
"
Depok: Fakultas Teknik Universitas Indonesia, 2010
S51259
UI - Skripsi Open  Universitas Indonesia Library
cover
Stallings, William
New York: Prentice-Hall, 1995
005.8 STA n
Buku Teks SO  Universitas Indonesia Library
cover
Stallings, William
London: Pearson Education, 2003
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>