VISUALISASI MONITORING PORT MENGGUNAKAN SHOREWALL DAN LOG ANALIZER
Abstract
Full Text:
PDF (Bahasa Indonesia)References
Amijaya, Nur, 2004. Workshop Linux Server With RedHat 8. Yogyakarta : Bugs Training Center.
Anton, R, Raharja, Afri, Y., dan Wisesa, W., Open Source Campus Agreement Modul Pelatihan “Administrasi Jaringan Linux“, http://www.pandu.or.id
Hidayat, Risanuri , proxy, http://www.te.ugm.ac.id/~risanuri/jarkom/
Indrajit, E.R., Prastowo, B., N., Yuliardi Rofiq., 2002, Memahami Security Linux, PT. Elex Komputindo, Jakarta.
Mansfield, Niall, 2004. Practical TCP/IPJilid 2. Yogyakarta : Andi.
Pedyanto, Yudho, 2003. Modul Pelatihan Internetworking. Yogyakarta : Linux Learning Center.
Purbo, O.W., 1999, TCP/IP, Cetakan Ketiga, PT. Elex Komputindo, Jakarta.
Rudiyanto, Dudy, dkk, 2002. Administrasi Sistem Linux RedHat. Jakarta, PT. Elex Media Komputindo
Rudiyanto, Dudy, dkk, 2003., Security Open System, Ketiga, PT. Elex Komputindo, Jakarta
Shorewall, Documentation, http://shorewall.net/Documentation_Index.html
Securing-Optimizing-Linux-The-Ultimate-Solution.pdf, http://www.openna.com
Tanutama, L., dkk, 1992, Mengenal LAN, Cetakan Kedua, PT. Elex Komputindo, Jakarta.
Wagito, 2005. Jaringan Komputer Teori dan Implementasi Berbasis Linux. Yogyakarta : Gava Media
http://fwlogwatch.inside-security.de/
Refbacks
- There are currently no refbacks.