SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
DAFTAR PUSTAKA


Dhar, Summit. ―Sniffers – Basic and Detection‖. Reliance Infocomm. 2002.
Ivar Jacobson, Grady Booch, and Jim Rumbaugh. “Unified Software Development
       Process‖. Addison-Wesley, 2002.
Klevinsky, T.J dan Scott Laliberte. ―Hack I.T. – Security Through Penetration
       Testing‖. Addison-Wesley. 2002.
M. Farid Azis. ―Belajar Sendiri Pemrograman PHP 4 Bagi Web Programmer‖.
       PT Elex Media Komputindo, Jakarta, 2001.
Philippe Kruchten. A Rational Development Process, “CrossTalk‖, vol 9 (7),
       STSC, Hill AFB, UT, hal.11-16.
Philippe Kruchten. Rational Unified Process—An Introduction. Addison-Wesley,
       1998.
Rational Team. ―Rational Unified Process : Best Practices for Software
       Development Teams‖. 2001.
Rivest, R. “The MD5 Message-Digest Algorithm [RFC1321]‖. MIT. 1994.
Suhendar,A. ―Teknologi Pemograman Mobile Commerce‖. Penerbit Informatika,
       Bandung, 2002.
“Keystroke logging”. Maret 2008 [Online] Available
       http://en.wikipedia.org/wiki/Keystroke_logging, diakses 20 Juli 2009.
“Lookup table”. [Online] Available http://en.wikipedia.org/wiki/lookup_table,
       diakses 25 Oktober 2009.
“MD5”. [Online] Available http://en.wikipedia.org/wiki/MD5, diakses 20 Juli
       2009.

Mais conteúdo relacionado

Semelhante a affTA00 - 14 Daftar Pustaka

Pakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event PresentationPakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event Presentation
Solutions Inc Pakistan
 
Ron Kohavi, PhD
Ron Kohavi, PhDRon Kohavi, PhD
Ron Kohavi, PhD
butest
 
Open Source India Tech Days 2009
Open Source India Tech Days 2009Open Source India Tech Days 2009
Open Source India Tech Days 2009
Shayon Pal
 
Secure Software Development Lifecycle.pptx
Secure Software Development Lifecycle.pptxSecure Software Development Lifecycle.pptx
Secure Software Development Lifecycle.pptx
LeonHamilton4
 

Semelhante a affTA00 - 14 Daftar Pustaka (20)

Sem 5 books-list
Sem 5 books-listSem 5 books-list
Sem 5 books-list
 
Pakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event PresentationPakistan CIO Summit and Expo 2013-Post Event Presentation
Pakistan CIO Summit and Expo 2013-Post Event Presentation
 
Ron Kohavi, PhD
Ron Kohavi, PhDRon Kohavi, PhD
Ron Kohavi, PhD
 
F.Curriculum Vitae
F.Curriculum VitaeF.Curriculum Vitae
F.Curriculum Vitae
 
Best Of 5 Cyber Forensic Companies.pdf
Best Of 5 Cyber Forensic Companies.pdfBest Of 5 Cyber Forensic Companies.pdf
Best Of 5 Cyber Forensic Companies.pdf
 
Open Source India Tech Days 2009
Open Source India Tech Days 2009Open Source India Tech Days 2009
Open Source India Tech Days 2009
 
Implementing OData: Create a UG Event Feed
Implementing OData: Create a UG Event FeedImplementing OData: Create a UG Event Feed
Implementing OData: Create a UG Event Feed
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Opensource Presentation
Opensource PresentationOpensource Presentation
Opensource Presentation
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Eu cv english
Eu cv englishEu cv english
Eu cv english
 
Introductory Talk at COSTAATT
Introductory Talk at COSTAATTIntroductory Talk at COSTAATT
Introductory Talk at COSTAATT
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Secure Software Development Lifecycle.pptx
Secure Software Development Lifecycle.pptxSecure Software Development Lifecycle.pptx
Secure Software Development Lifecycle.pptx
 
Cyber Security Congress Bangalore
Cyber Security Congress BangaloreCyber Security Congress Bangalore
Cyber Security Congress Bangalore
 

Mais de Muhammad Affandes (20)

affTA09 - LampiranA
affTA09 - LampiranAaffTA09 - LampiranA
affTA09 - LampiranA
 
affTA05 - BAB V
affTA05 - BAB VaffTA05 - BAB V
affTA05 - BAB V
 
affTA02 - BAB II
affTA02 - BAB IIaffTA02 - BAB II
affTA02 - BAB II
 
affTA03 - BAB III
affTA03 - BAB IIIaffTA03 - BAB III
affTA03 - BAB III
 
affTA00 - 11 Daftar Gambar
affTA00 - 11 Daftar GambaraffTA00 - 11 Daftar Gambar
affTA00 - 11 Daftar Gambar
 
affTA00 - 07 Abstrak
affTA00 - 07 AbstrakaffTA00 - 07 Abstrak
affTA00 - 07 Abstrak
 
Sidang TA
Sidang TASidang TA
Sidang TA
 
affTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
affTA00 - 04 Lembar Hak Atas Kekayaan IntelektualaffTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
affTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
 
affTA00 - 09 Kata Pengantar
affTA00 - 09 Kata PengantaraffTA00 - 09 Kata Pengantar
affTA00 - 09 Kata Pengantar
 
affTA11 - LampiranC
affTA11 - LampiranCaffTA11 - LampiranC
affTA11 - LampiranC
 
affTA01 - BAB I
affTA01 - BAB IaffTA01 - BAB I
affTA01 - BAB I
 
affTA06 - BAB VI
affTA06 - BAB VIaffTA06 - BAB VI
affTA06 - BAB VI
 
affTA00 - 12 Daftar Tabel
affTA00 - 12 Daftar TabelaffTA00 - 12 Daftar Tabel
affTA00 - 12 Daftar Tabel
 
affTA14 - LampiranD
affTA14 - LampiranDaffTA14 - LampiranD
affTA14 - LampiranD
 
affTA00 - 10 Daftar Isi
affTA00 - 10 Daftar IsiaffTA00 - 10 Daftar Isi
affTA00 - 10 Daftar Isi
 
affTA00 - 03 Lembar Pengesahan
affTA00 - 03 Lembar PengesahanaffTA00 - 03 Lembar Pengesahan
affTA00 - 03 Lembar Pengesahan
 
affTA00 - 05 Lembar Pernyataan
affTA00 - 05 Lembar PernyataanaffTA00 - 05 Lembar Pernyataan
affTA00 - 05 Lembar Pernyataan
 
affTA00 - 02 Lembar Persetujuan
affTA00 - 02 Lembar PersetujuanaffTA00 - 02 Lembar Persetujuan
affTA00 - 02 Lembar Persetujuan
 
affTA10 - LampiranB
affTA10 - LampiranBaffTA10 - LampiranB
affTA10 - LampiranB
 
affTA00 - Cover dan Daftar
affTA00 - Cover dan DaftaraffTA00 - Cover dan Daftar
affTA00 - Cover dan Daftar
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

affTA00 - 14 Daftar Pustaka

  • 1. DAFTAR PUSTAKA Dhar, Summit. ―Sniffers – Basic and Detection‖. Reliance Infocomm. 2002. Ivar Jacobson, Grady Booch, and Jim Rumbaugh. “Unified Software Development Process‖. Addison-Wesley, 2002. Klevinsky, T.J dan Scott Laliberte. ―Hack I.T. – Security Through Penetration Testing‖. Addison-Wesley. 2002. M. Farid Azis. ―Belajar Sendiri Pemrograman PHP 4 Bagi Web Programmer‖. PT Elex Media Komputindo, Jakarta, 2001. Philippe Kruchten. A Rational Development Process, “CrossTalk‖, vol 9 (7), STSC, Hill AFB, UT, hal.11-16. Philippe Kruchten. Rational Unified Process—An Introduction. Addison-Wesley, 1998. Rational Team. ―Rational Unified Process : Best Practices for Software Development Teams‖. 2001. Rivest, R. “The MD5 Message-Digest Algorithm [RFC1321]‖. MIT. 1994. Suhendar,A. ―Teknologi Pemograman Mobile Commerce‖. Penerbit Informatika, Bandung, 2002. “Keystroke logging”. Maret 2008 [Online] Available http://en.wikipedia.org/wiki/Keystroke_logging, diakses 20 Juli 2009. “Lookup table”. [Online] Available http://en.wikipedia.org/wiki/lookup_table, diakses 25 Oktober 2009. “MD5”. [Online] Available http://en.wikipedia.org/wiki/MD5, diakses 20 Juli 2009.