Asep Kurniawan - Keamanan Komputer dan Internet Jilid 1

139 DAFTAR PUSTAKA Ariyus, D. (2007). Intrusion Detection System.Yogyakarta:Andi. Defiana Arnaldy, (2019), Modul Ajar Keamanan Komputer dan Internet. Depok, Indonesia. Eastom C. Computer Security Fundamental. Pearson. 2012 Gollmann, Dieter 1984, Computer SecurityVol 1 ByDieter Gollmann (1999, Papperback), New York, Wiley. Graves K. CEH Study Guide. Sybex Willey Publishing. 2010. Graves, Kimberly. 2010. CEH: Certified Ethical Hacker Study Guide. Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana. Harper A., Harris S., Ness J., Eagle C., Lenkey G., and William T. Gray Hat Hacking The Ethical Hacker HandBook Third Edition. McGrawHill. 2011. Howard, John D. “AnAnalysis Of Security Incidents On The Internet 1989 - 1995,” PhD thesis, Engineering and Public Policy, Carnegie Mellon University,1997. Iwan Sofana, (2013), Teori danModul Praktikum Jaringan Komputer. Bandung, Indonesia: Modula Rahardjo Budi. 1999. Keamanan Sistem Informasi Berbasis Internet. PT Insan Komunikasi / Infonesia – Bandung. Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed - Network Security Secrets & Solutions, McGrawHill 2005 Wikipedia, https://id.wikipedia.org/wiki/Dasar_sistem_keamanan_ komputer. di akses pada hari selasa, 20 April 2021

RkJQdWJsaXNoZXIy MTM3NDc5MQ==