PERANCANGAN PENGAMANAN SERVER SECARA OTOMATIS MENGGUNAKAN METODE ADAM (AUTOMATIC EVENT DETECTION AND ACTIVITY MONITORING)
Submitted : 2017-02-09, Published : .
Abstract
Keywords
Full Text:
PDF (Bahasa Indonesia)References
Eichel,Zee., Baster, James., Rizqi, Habibi., 2012. Attacking Site With Backtrack. Indonesian Backtrack Team
Nikodemus, 2012. Network Hacking dengan Linux Backtrack. Penerbit : Andi Yogyakarta dan Wahana Komputer
Rahman, Rizal. 2013. Mahir Administrasi Server dan Router dengan Linux Ubuntu Server 12.04 LTS. Bekasi, Creative Commons Attribution-ShareAlike 3.0 Unported License (CC by SA)
http://blog.pusheax.com/2014/01/dictionary-and-brute-force-attack-using.html. Diakses pada 10 Juli 2015, 02:01:17 AM
http://blog.pusheax.com/2014/12/metasploit-port-scanning.html. Diakses pada 10 Juli 2015, 02:35:23 AM
https://www.howtoforge.com/triggering-commands-on-file-or-directory-changes-with-incron. Diakses pada 14 Juli 2015, 2:04:13 PM
http://www.w3schools.com/php/func_filesystem_fgets.asp. Diakases pada 14 Juli 2015, 2:03:09 PM
http://www.ubuntugeek.com/bandwidth-monitoring-tools-for-ubuntu-users.html. Diakses pada 01 Agustus 2015, 20:18 WIB
https://id.scribd.com/doc/171582542/Gilang-Instalasi-Konfigurasi-Portsentry. Diakses pada 2 Agustus 2015, 2:11:24 AM
http://www.asus87.com/2011/05/aplikasi-ftp-client-di-linux-ubuntu/. Diakses pada 02 Agustus 2015, 02:33 WIB
Article Metrics
Abstract view: 398 timesDownload  : 462 times
This work is licensed under a Creative Commons Attribution 4.0 International License.
Refbacks
- There are currently no refbacks.