The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
cover
IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA…
Firmansyah, Rifki 

Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps …

Edition
-
ISBN/ISSN
-
Collation
xvi, 40 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1318812023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN DDOS PADA APACHE SPARK MENGGUNAKAN METODE LONG SHORT TER…
Hanayuda, Dwi Lingga

Distributed Denial-of-Service (DDoS) attacks pose a serious threat to computer network infrastructures. Apache Spark, as a popular distributed data processing platform, requires effective methods t…

Edition
-
ISBN/ISSN
-
Collation
xiv, 77 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1278172023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN DDOS PADA APACHE SPARK MENGGUNAKAN METODE LONG SHORT TER…
Hanayuda, Dwi Lingga

Distributed Denial-of-Service (DDoS) attacks pose a serious threat to computer network infrastructures. Apache Spark, as a popular distributed data processing platform, requires effective methods t…

Edition
-
ISBN/ISSN
-
Collation
xiv, 77 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1278172023
Availability1
Add to basket
View DetailCite
cover
ANALISIS SERANGAN DDOS DENGAN MENGGUNAKAN ANOMALY-BASED IDS BERBASIS NETWORK …
Salasa, Garinnang Baiduri

DDoS assaults pose a serious threat to enterprises, inflicting damage and disruption, thus improving the speed and accuracy of DDoS detection and mitigation is critical. The combination of Network …

Edition
-
ISBN/ISSN
-
Collation
xii, 73 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T918942023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI KEAMANAN DATA PADA SUPPLY CHAIN MANAGEMENT MENGGUNAKAN METODE BL…
Ramadhan, Muthia Fadhila

Blockchain merupakan teknologi yang berkembang dengan pesat dengan teknologi keamanan data yang akan meningkatkan kepercayaan suatu pengguna melalui sistem yang terdistribusi. Blockchain terdapat f…

Edition
-
ISBN/ISSN
-
Collation
xv, 83 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1051652023
Availability1
Add to basket
View DetailCite
cover
Mengamankan Web Server dari Serangan Hacker/Cracker
Newman Frans

Edition
-
ISBN/ISSN
979-20-3137-5
Collation
xii, 177 hlm
Series Title
-
Call Number
005.8 New m

Edition
-
ISBN/ISSN
979-20-3137-5
Collation
xii, 177 hlm
Series Title
-
Call Number
005.8 New m
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ROUTING DALAM MENCARI JALUR TERBAIK MENGGUNAKAN METODE HYBRID FU…
Jumiati, Jumiati

With the increasing use of vehicles and the large human population in urban areas, the level of traffic jams is high. Every motorist certainly does not want to be stuck in a traffic jam for too lon…

Edition
-
ISBN/ISSN
-
Collation
xv, 66 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T849302022
Availability1
Add to basket
View DetailCite
cover
RANCANG BANGUN SISTEM KEAMANAN PINTU RUMAH MENGGUNAKAN QR CODE BERBASIS ARDUI…
Putra, Prado Pratama

Sistem keamanan pada kunci pintu rumah yang ada saat ini kebanyakan merupakan sistem keamanan manual berupa kunci atau gembok konvensional. Penelitian bertujuan menciptakan sistem keamanan pada kun…

Edition
-
ISBN/ISSN
-
Collation
xii, 57 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T826112022
Availability1
Add to basket
View DetailCite
cover
SECURITY JARINGAN KOMPUTER BERBASIS CEH
Primartha, Rifkie

Penulis mendapati bahwa permasalahan riil yang terkait security jaringan komputer, khususnya yang terkait dengan aktifitas hacking, sudah mencapai batas ambang "gawat darurat". Sehingga diperlukan …

Edition
-
ISBN/ISSN
978-602-6232-57-1
Collation
viii, 286 hlm. : ilus. ; 25 cm.
Series Title
-
Call Number
005.8 Rif s
Availability4
Add to basket
View DetailCite
cover
Windows Forensic
Zaki, AliWinarno, EdySmitDev Community

Edition
-
ISBN/ISSN
978-602-00-3145-3
Collation
116 hlm. : ilus. ; 21 cm
Series Title
-
Call Number
005.8 Win w

Edition
-
ISBN/ISSN
978-602-00-3145-3
Collation
116 hlm. : ilus. ; 21 cm
Series Title
-
Call Number
005.8 Win w
Availability1
Add to basket
View DetailCite
cover
SISTEM KEAMANAN KOMPUTER
Stiawan, Deris

Edition
-
ISBN/ISSN
979-20-6525-3
Collation
viii, 179 hlm.: ilus.; 21 cm.
Series Title
-
Call Number
005.8 Sti s

Edition
-
ISBN/ISSN
979-20-6525-3
Collation
viii, 179 hlm.: ilus.; 21 cm.
Series Title
-
Call Number
005.8 Sti s
Availability1
Add to basket
View DetailCite
cover
PERANCANGAN POWER SUPPLY SWITCH MODE
Muis Saludin

Edition
-
ISBN/ISSN
978-602-262-229-1
Collation
xiii, 193 hlm
Series Title
-
Call Number
005.8 Mui p

Edition
-
ISBN/ISSN
978-602-262-229-1
Collation
xiii, 193 hlm
Series Title
-
Call Number
005.8 Mui p
Availability3
Add to basket
View DetailCite
cover
KEAMANAN INFORMASI DAN INTERNET : Modul Pembelajaran Berbasis Standar Kompete…
Indrajit, Richardus Eko

Edition
2
ISBN/ISSN
978-602-60296-5-2
Collation
xx, 188 hlm.; ilus. 29,3 cm
Series Title
-
Call Number
005.8 Ind k

Edition
2
ISBN/ISSN
978-602-60296-5-2
Collation
xx, 188 hlm.; ilus. 29,3 cm
Series Title
-
Call Number
005.8 Ind k
Availability3
Add to basket
View DetailCite
cover
Konsep dan Strategi KEAMANAN INFORMASI DI DUNIA CYBER
Indrajit, Richardus Eko

Edition
-
ISBN/ISSN
978-602-262-234-5
Collation
xiv, 259 hlm.; ilus.; 23 cm.
Series Title
-
Call Number
005.8 Ind k

Edition
-
ISBN/ISSN
978-602-262-234-5
Collation
xiv, 259 hlm.; ilus.; 23 cm.
Series Title
-
Call Number
005.8 Ind k
Availability3
Add to basket
View DetailCite
cover
SISTEM KEAMANAN WEB SERVICE (RESTFUL API) PADA JSON WEB TOKEN UNTUK MENGUKUR …
Rosyada, Amrina

Di dalam perkembangan bisnis, web service sungguh sangat dibutuhkan dalam integrasi sistem karena tidak melihat platform, arsitektur maupun bahasa pemrograman yang digunakan oleh sumber berbeda. Ke…

Edition
-
ISBN/ISSN
-
Collation
xvi, 60 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T636652021
Availability1
Add to basket
View DetailCite
cover
SISTEM KEAMANAN WEB SERVICE (RESTFUL API) PADA JSON WEB TOKEN UNTUK MENGUKUR …
Annisa, Resky Panelya

In modern times, growing on the Internet in terms of technology and its use can bring many positive things to human life. Surely it cannot be denied that Internet technology has had a negative impa…

Edition
-
ISBN/ISSN
-
Collation
xvi, 57 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T634532021
Availability1
Add to basket
View DetailCite
cover
SISTEM PENCEGAHAN SERANGAN DDOS TCP FLOOD MENGGUNAKAN ALGORITMA INGRESS/EGRES…
Cahyadi, Mohammad

DDoS TCP Flood attack is a condition where the attacker exploits the three-way handshaking mechanism of the TCP connection establishment process, where the server will be flooded with requests for …

Edition
-
ISBN/ISSN
-
Collation
xv, 58 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T528212021
Availability1
Add to basket
View DetailCite
cover
SISTEM PENCEGAHAN RANSOMWARE WANNACRY MENGUNAKAN METODE STRING MATCHING
Ikhsan, Muhammad

Wannacry ransomware is a specific type of malware that threatens access to victims unless their data has been redeemed or paid for. Usually, ransomware encrypts the content on the victim's hard dri…

Edition
-
ISBN/ISSN
-
Collation
xv, 68 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T529702021
Availability1
Add to basket
View DetailCite
cover
KEAMANAN JARINGAN SISTEM PENCEGAHAN SERANGAN DHCP ROGUE DENGAN DHCP SNOOPING
Wijayanti, Alfina

The focus of this research is to protect the network from DHCP Rogue (fake DHCP server), by implementing DHCP Snooping and VLAN on one of the network devices, namely a switch. The network built in …

Edition
-
ISBN/ISSN
-
Collation
xviii, 62 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T525052021
Availability1
Add to basket
View DetailCite
cover
SISTEM PENGAMANAN PESAN DENGAN METODE KRIPTOGRAFI RC4 DAN STEGANOGRAFI LEAST …
Nugraha, Anang

The security of information is an essential aspect that must be considered these days, especially for private or confidential information, security can be done in several ways, including cryptograp…

Edition
-
ISBN/ISSN
-
Collation
xvv, 89 hlm. : ilus. ; 29 cm
Series Title
-
Call Number
T477082021
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MAN IN THE MIDDLE PADA IOT INDUSTRI (IIOT) SCADA MENGGUNAKAN…
Purnama, Linda

Sistem Supervisory Control And Acquisition (SCADA) adalah sistem kontrol industri otomatis yang digunakan untuk mengontrol serta memantau berbagai tahapan industri yang menyebar luas, dimana akuisi…

Edition
-
ISBN/ISSN
-
Collation
xiv, 51 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T537212021
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN PAKET RANSOMWARE MENGGUNAKAN METODE DEEP PACKET INSPECTION
Saputra, Dio Azmi

Visualization is a technique to present the number of Ransomware packet attacks that occur on datasets that have been provided by Unavarra. Attacks Visualization aiming to recognize attacks and mak…

Edition
-
ISBN/ISSN
-
Collation
xiii, 56 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T530812021
Availability1
Add to basket
View DetailCite
cover
KEAMANAN DATA PADA JARINGAN KOMPUTER
Kristanto, Andri

Edition
1
ISBN/ISSN
979-3469-00-5
Collation
xii, 176 hal, ilus 20 cm
Series Title
-
Call Number
005.8 Kri k

Edition
1
ISBN/ISSN
979-3469-00-5
Collation
xii, 176 hal, ilus 20 cm
Series Title
-
Call Number
005.8 Kri k
Availability10
Add to basket
View DetailCite
cover
Medium interaction honeypot sebagai alat untuk meniru aplikasi asli untuk men…
Tofan Hidayat

Saat ini teknologi informasi semakin berkembang pesat. Penggunaan teknologi saat ini telah mencakup seluruh aspek kehidupan. Hampir setiap hari muncul berbagai inovasi terbaru dalam bidang teknol…

Edition
-
ISBN/ISSN
-
Collation
xv, 44 hlm. : ilus.
Series Title
-
Call Number
5,807 Tof m 2016
Availability0
Add to basket
View DetailCite

Search Result

Found 24 from your keywords: Subject : "Keamanan Data"
Query took 0.00664 second(s) to complete
XML ResultJSON Result

Suggestion
image
STRATEGIES AND TACTICS IN ORGANIC SYNTHESIS
Lindberg, Thomas
image
Penerapan PSIKOLOGI dalam PERAWATAN
McGhie, Andrew
image
Functional foods, cardiovascular disease and diabetes
Arnoldi, A.
image
PENGARUH BRAND AMBASSADOR DAN BRAND IMAGE TERHADAP KEPUTUSAN PEMBELIAN MASKER WAJAH MUSTIKA RATU PADA MASYARAKAT KOTA PALEMBANG
Ulandari, Meli
image
Renungan para manajer
Bruce N Hyland
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search