Penerapan sistem keamanan jaringan pada kursus komputer menggunakan mikrotik
Abstract
Keywords
Full Text:
PDFReferences
Arifwidodo, B., Syuhada, Y., & Ikhwan, S. (2021). Analisis kinerja mikrotik terhadap serangan brute force dan ddos. Techno. Com, 20(3), 392-399.
Babys, J. Y., Kusrini, K., & Sudarmawan, S. (2015). Analisis Aspek Keamanan Informasi Jaringan Komputer (Studi Kasus: STIMIK Kupang). In Seminar Nasional Informatika (SEMNASIF), 1(5) 7-14.
Dreisiebner, S., Kuttkat, F., März, S., & Mandl, T. (2021). Information behavior during Covid-19: differences of South American and German media users, their confidence with information provision and handling of misinformation. AIB studi, 61(2), 359-373.
Erlando, R., Diana, D., & Ulfa, M. (2020). Penerapan sistem keamanan firewall pada router cisco 1841 dan monowall pada sistem operasi bsd (berkeley software distribution). In Bina Darma Conference on Computer Science (BDCCS), 2(1), 236-243.
Irawan, D. (2015). Keamanan jaringan komputer dengan metode blocking port pada laboratorium komputer program diploma-iii sistem informasi universitas muhammadiyah metro. MIKROTIK: Jurnal Manajemen Informatika, 5(2).
Isnanta, A. W., Kurniawan, M. T., & Widjajarto, A. (2017). Perancangan jaringan multiprotocol label switching menggunakan metode ndlc untuk layanan voip dan streaming video universitas telkom. eProceedings of Engineering, 4(2).
Khalil, R., Mansour, A. E., Fadda, W. A., Almisnid, K., Aldamegh, M., Al-Nafeesah, A., ... & Al-Wutayd, O. (2020). The sudden transition to synchronized online learning during the COVID-19 pandemic in Saudi Arabia: a qualitative study exploring medical students’ perspectives. BMC medical education, 20, 1-10.
Li, R., Li, X., Hui, K. H., & Fu, C. W. (2021). SP-GAN: Sphere-guided 3D shape generation and manipulation. ACM Transactions on Graphics (TOG), 40(4), 1-12.
Naim, F., Saedudin, R. R., & Hediyanto, U. Y. K. S. (2022). Analysis of wireless and cable network quality-of-service performance at telkom university landmark tower using network development life cycle (ndlc) method. JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), 7(4), 1033-1044.
Wang, Y., Qiu, W., Dong, L., Zhou, W., Pei, Y., Yang, L., ... & Lin, Z. (2020). Proxy signature-based management model of sharing energy storage in blockchain environment. Applied Sciences, 10(21), 7502.
DOI: https://doi.org/10.17509/integrated.v4i2.51524
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Universitas Pendidikan Indonesia (UPI)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Journal has been indexed by: