-
1“... is trying to improve computer network security, where one of them is limiting the access of users who...”
Get full text
Article -
2“...-technical which can affect system performance. GRR Rapid Response is the answer to internet network security...”
Get full text
Article -
3Business Impact Analysis Sistem Dan Jaringan Komputer Menggunakan Metode Network Security Assessmentby I Gede Putu Krisna Juliharta“... melakukan penilaian terhadap jaringan komputer Pemerintah Kota Denpasar menggunakan metode network security...”
Published 2011-09-01
Get full text
Article -
4
-
5by Ahmad Budi SetiawanSubjects: “...network security...”
Published 2017-03-01
Get full text
Article -
6by Ahmad Budi SetiawanSubjects: “...network security...”
Published 2015-12-01
Get full text
Article -
7“... pengujian dalam pengimplementasian jaringan Site to Site IP Security Virtual Private Network With Algorithm...”
Get full text
Article -
8by Ikhwan Ruslianto“... Network menggunakan protokol SSTP (Secure Socket Tunneling Protocol) agar Server dan aplikasi yang ada di...”
Published 2019-02-01
Get full text
Article -
9Subjects: “...cowrie honeypot, snort inline-mode, intrusion prevention system, network security...”
Get full text
Article -
10Subjects: “...ipvpn (internet protocol virtual private network), ipsec (ip security), gsm, fortigate, failover....”
Get full text
Article -
11by Oris Krianto Sulaiman“... satu faktor yang mempengaruhi kualitas dalam jaringan adalah network security atau keamanan jaringan...”
Published 2016-01-01
Get full text
Article -
12“...We develop a new credit risk model for Indian debt securities rated by major credit rating agencies...”
Get full text
Article -
13
-
14by Agus TedyyanaSubjects: “...computer assisted test, secure socket layer...”
Published 2020-05-01
Get full text
Article -
15by Ferril Irham Muzaki“... of elementary school students. Keywords: electronic transactions, information, network security, cyber security...”
Published 2018-08-01
Get full text
Article -
16by Linda L Spencer“... future for itself, that list would begin with things like permanent peace, security, political...”
Published 2011-12-01
Get full text
Article -
17by Ervin Kusuma Dewi“..., tetapi fokus sebagai security packet sniffing. Tujuan dari penelitian ini yaitu menganalisis Log snort...”
Published 2017-12-01
Get full text
Article -
18by Ahmad Budi Setiawan“... that combines telecommunications infrastructure and Internet networks used in the public service. Thus...”
Published 2015-06-01
Get full text
Article -
19
-
20by Sidiq Syamsul Hidayat, Karina Laras Novitasari, Amin Syarifuddin, Wilda Puspa Pratiwi, Sri Hardiningsih HS, Rev. Ariawan PratomoSubjects: “...network...”
Published 2019-07-01
Get full text
Article