Tripod1G >>Telematika Indonesia,” 1998.
Budi Raharjo keamanan

Tripod1G rental sewa projector proyektor lcd infocus jakarta proudly present

Tripod1G> 37. Bruce Schneier, “: Protocols, Algorithms, and
Source Code in C,” second edition, John Wiley & Sons, Inc., 1996.
38. Bruce Schneier, “Secrets & Lies: Digital Security in a Networked
Wor l d,” John Wiley & Sons, Inc., 2000.
39. Simon Singh, “The Code Book: the secret history of codes & code-breaking,”
Fourth Estate, London, 1999.
40. William Stallings, “Network and Internetwork Security,” Prentice Hall,
1995.
41. W. Richard Stevens, “TCP/IP Illustrated, Volume 3: TCP for Transac-tions,
HTTP, NNTP and the UNIX Domain Protocols,” Addison-Wesley,
1994.
42. Paul Taylor, “Them and us”, electronic document (Chapter 6 of his PhD
dissertation), 1997.
http://www.rootshell.com
43. Tim Koordinasi Telematika Indonesia, “Gambaran Umum Pemban-gunan
Telematika Indonesia,” 1998.
Sumber informasi dan organisasi yang
berhubungan dengan keamanan sistem
informasi
1. 2600
http://www.2600.com
Berisi informasi tentang bermacam-macam hacking bawah tanah beserta
koleksi gambar dari tempat-tempat (web site) yang pernah dihack.
2. Anti Online
http://www.antionline.com
3. CERT (Center of Emergency Response Team)
http://www.cert.org
Merupakan sumber informasi yang cukup akurat dan up to date tentang
keamanan Internet. CERT Advisories merupakan pengumuman berkala
tentang security hole and cara mengatasinya.
4. CIAC
ftp://ciac.llnl.gov/pub/ciac

Next >>
Back to Budi Raharjo Index