Daftar isi: BAB 1 Pendahuluan 1.1 Pengertian VPN 1.2 Perkembangan VPN 1.3 Aplikasi VPN 1.4 Protokol-protokol VPN 1.5 Tunneling 1.6 Freeswan project BAB 2 Instalasi debian GNU/Linux 2.1 Pendahuluan 2.2 Nilai minus debian 2.3 Mengapa memilih debian 2.4 Kebutuhan hardware debian 2.5 Persiapan sebelum instalasi debian 2.6 Memperoleh media system instalasi debian 2.7 Boot sistem …
Contents Part 1-Installing OS/2 Chapter 1. As You Begin Chapter 2. Using Easy Installation Part 2-Exploring OS/2 Chapter 3. Exploring the Desktop Part 3-Using OS/2 Chapter 4. Customizing Your System Chapter 5. Starting Objects Autimatically Chapter 6. Using Disk Drives Chapter 7. Using Command Prompts Chapter 8. Cleaning Up Your Desktop Chapter 9. Using the Shredder Chapt…
Contents: Preface Introduction Chapter 1 Presenting the Apple II Chapter 2 Getting Started Chapter 3 Disk Commands Chapter 4 Fundamentals of BASIC Programming Chapter 5 Using Strings and numbers Chapter 6 Program Organization and Control Chapter 7 Screen Output and Data Entry Chapter 8 Printer Output Chapter 9 Programming Disk Data Files Chapter 10 Graphics Chapter 11 Sound Ch…
Daftar isi: Pendahuluan Ada Analyst workbench Artificial intelligence Case CCITT Cim Cmos/ECL Cycle time Database Data dictionary Data protection Design methodologies Desktop publishing Distributed dasabase Edi Esprit Ethernet Expert system Fault tolerance Fifth generation/generasi kelima File server Fourth generation language Function point Gallium arsenide IPSE IS…
Daftar isi: BAB 1 Konsep dasar jaringan komputer BAB 2 Standar, proses dan sejarah BAB 3 Konsep dasar protokol BAB 4 Pengalamatan internet protocol BAB 5 DNS (domain name systrm) BAB 6 Routing BAB 7 Implementasi DNS BAB 8 Implementasi routing IPv4 BAB 9 Implementasi roumting IPc6 BAB 10 Ringkasan
Daftar isi: Bab 1 Validasi input 1.1 Validasi angka 1.2 Validasi string 1.3 Input yang membingungkan 1.4 Problema file Bab 2 Cross-site scripting 2.1 Enconding solution 2.2 Menangani atribut 2.3 Mengakali filter 2.4 Strip-tags () 2.5 Environtmen variables Bab 3 SQL injection 3.1 Magic quates 3.2 Ketepatan tipe data 3.3 Penyerangan like 3.4 SQL error handling 3.5 File inc…
Daftar isi: Bab I Aplikasi Antivirus Bab II Aplikasi Imaging System Bab III Aplikasi File Recovery Bab IV Aplikasi Dekstop Locker Bab V Aplikasi Perawatan Sistem Bab VI Aplikasi proteksi folder Bab VII Aplikasi Pop up blocker Bab VIII Aplikasi firewall Bab IX Aplikasi
Daftar isi: BAB 1 Pendahuluan BAB 2 DNS server BAB 3 Web server BAB 4 Samba server BAB 5 FTP server BAB 6 SSH server dan SCP BAB 7 Clam antivirus server BAB 8 Network monitoring BAB 9 DHCP server BAB 10 Firewall BAB 11 NFS server BAB 12 Proxy server BAB 13 Mail server
Daftar isi: Mengenal windows NT server 4.0 User account: group, domain, dan trust relationships Mengelola domain dan trust relationship Pengelolaan user dan group Berbagi pakai drive, direktori, dan file Penggunaan dan pengelolaan printer Menggunakan client windows dan DOS Menggunakan client windows NT Konfigurasi hardware server Pengelolaan server Konfigurasi jaringan dan pengelol…