Daftar isi: Pendahuluan Pengenalan jaringan computer Sejarah jaringan computer Pengenalan perangkat keras jaringan Topologi jaringan IP address Instalasi linux Ubuntu Mendapatakan software Ubuntu Instalasi linux untuk networking Konfigurasi penambahan repository Instalasi aplikasi melalui terminal Instalasi aplikasi melalui Ubuntu software center Konfigur…
Termasuk bibliografi dan indeks. Contents Part one . Wireless ad hoc,Sensor and Mesh Networking 1. Introduction 2. Wireless Ad Hoc, Sensor and Mesh Networks 3. The Wireless Medium 4. Medium Access and error Control 5. Routing 6. Reliability, Flow and Congestion Control 7. Other Challenges and Security aspects Part Two. Security in Wireless Ad Hoc, Sensor and Mesh Networking…
Daftar isi: Bab 1. Pendahuluan 1.1 Definisi Jaringan Komputer 1.2 Tujuan Dibangunnya Jaringan Komputer 1.3 Sasaran Terbentuknya Jaringan Komputer 1.4 Manfaat Jaringan Komputer 1.5 Macam Jaringan Komputer Latihan Bab 2. Model Referensi OSI 2.1 Karakteristik Lapisan OSI 2.2 Protokol 2.3 Lapisan-lapisan Model OSI Latihan Bab 3. Physical La…
Daftar isi: BAB 1 KONSEP DASAR KOMUNIKASI DATA Data dan komunikasi data Elemen elemen komunikasi data Terminal komunikasi data Kendala-kendala komunikasi data Implementasi komunikasi data Bentuk bentuk komunikasi data BAB 2 DATA DAN SINYAL Data dan sinyal analog Data dan sinyal digital Komponen komponen sinyal Pengkodean data Kode tujuh bit (ASCII) Kode 8 bit (kode EBCDIC) Ko…
Daftar isi: BAB 1. DASAR-DASAR NETWORKING 1.1 Terminologi perangkat jaringan 1.2 Osi referance model 1.3 Dasar-dasar TCP/IP 1.4 Ip version 1.5 IP (v6) addressing 1.6 Subneting 1.7 Network address translation(NAT) 1.8 DHCP BAB 2 DASAR DASAR IP ROUTING 2.1 Pendahuluan Linux routing 2.2 File konfigurasi jaringan 2.3 Rputing untuk jaringanyang terkoneksi lokal 2.4 Seleksi address …
Contents Part 1 understanding computer network security 1. Computer network fundamentes 2. Understanding computer network security Part 2 security challenges to computer network 3. Security threats to computer networks 4. Computer network vulnerabilitis 5. Cyber crimesand hakers 6. Hostile scripts 7. Security assessment,anlysis, and assurance Part 3 dealing with network securit…
Ceritified Internet Webmaster Exam 1D0-410 Contents Chapter 1. CIW Certification Exams 1 1.1. The exam situation / 2 1.2. Exam layout and design / 3 1.3. Exam focus / 5 1.4. CIW testing software recommendations / 5 1.5. Exam – taking concept / 6 1.6. Question handling strategies / 6 1.7. Judging yourself / 7 1.8. Additional resources / 7 Chapter 2. A General Networking Review …
Daftar Isi: Berdendang Bersama Internet Protocol Address-Season 1 0 - Bacalah Dulu 1 - Perkenalan Bermula 2 - Network Addressing-Ipv4 3 - IPV4 Address untuk Maksud Tertentu 4 - Proses Assign Address 5 - Bagian Dari Network Saya, Tidak ? 6 - Berhitung Address 7 - Classless Addressing 8 - KUHIP 9 - Testing Network Layer 10 - Simfoni Network Addressing Berkawan dengan …
Contents Part I Security Fundamentals Chapter 1. Basic Cryptography Chapter 2. Security Technologies Chapter 3. Export Control on Cryptography Part II The Corporate Security Policy Chapter 4. Threats in an Enterprise Network Chapter 5. Consideration for a Site Security Policy Chapter 6. Design and Implementations of the Corporate Security Policy …
Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…