KONFIGURASI SISTEM KEAMANAN JARINGAN

Alcianno G Gani

Sari


Along with the development of technology in the world of computing, human needs are also increasingly complex in its use for the development of these technologies. This is something that is only natural and supports each other between both technology and human needs. Technology will continue to be created from time to time, from the simple to the very sophisticated technology. With technology, it is expected that all human activities can be solved more easily, quickly and accurately. One of them is the existence of a network system. Through the network there are many conveniences that can be felt including sharing hardware, sharing software, facilitating communication between network users and sharing data and information more easily. Long distances are no longer a barrier to being able to get data and information quickly and safely. In network systems also need to be considered the security problem in order to avoid things that are not desirable, such as being attacked by a virus or reading data by unwanted parties.


Teks Lengkap:

PDF

Referensi


Jogiyanto Hartono, MBA, Akt, Ph.D, Analisis Dan Desain Sistem Informasi: Pendekatan Terstruktur Teori dan Praktek Aplikasi Bisnis, PN. Andi Yogyakarta, Yogyakarta, 1999.

Jogiyanto Hartono, MBA, Akt., Ph.D, Pengenalan Komputer, PN. Andi Yogyakarta, Yogyakarta, Edisi ke-2, Cetakan I, 1999.

Richardus Eko Indrajit. Dr, Pengantar Konsep Manajemen Sistem Informasi Dan Teknologi Informasi, PN. PT. Elex Media Komputindo, Jakarta, 2000.

Todd Lammle, CCNA: Cisco Certified Network Associate, Kelompok Gramedia, PT. Elex Media Komputindo, Jakarta, 2005.

Tavri D. Mahyuzir, Analisa & Perancangan Pengolahan Data, 1994, Elex

Media Komputindo

http://www.downloadnetsupport.com/index.htm

http://www.sunsite.unc.edu/mdw/HOWTO/Firewall-HOWTO.html




DOI: https://doi.org/10.35968/jsi.v6i1.280

Refbacks

  • Saat ini tidak ada refbacks.


Indexed by: