23
DAFTAR PUSTAKA
[1] Margrave David, GSM Security and Encryption, http://
www.netsecurity.sk/telekom/phreak/radiophone/gsm/gs
m-secur/gsm-security-and-encryption.htm
[2] Pesonen Lauri, GSM Interception, http://www.netsecurity.sk/teleko/phreak/
radiophone/gsm /gsm-secure/netsec.htm,
Diakses 20November 2006.
[3] Quirke, Jeremy, Security on GSM System (e-book). AusMobile, 2004.
[4] Anonim, CDMA End-to-End Security (ebook) , Nortel Network, 2005.
[5] Anonim, Teknologi Keamanan Pada Sistem CDMA, http://www.ristishop.com/
artikel/portal_article_detail.php.htm, Diakses 20
November 2006.
[6] Thomas M, 2011, Pengertian Remote Server,
http://www.businessdictionary.com/disclaimer.php,
Diakses 12 April 2011. [7] Kangmoes, 2011, Definisi
Server,
http://kangmoes.com/artikel-tips-ide-menarik-kreatif.definisi/pengertian-server.htm,
24
[8] Fakhrian F. A(10110008) dkk, Tugas Mata Kuliah Komjar Teknik
Informatika Unikom,
http://10110008.blog.unikom.ac.id/teknologi-
remote.4gd, Diakses 3 April 2012.
[9] Aditya Riski, Mengenal Jaringan GSM ( Global System for Mobile Communication),
http://www.adityarizki.net/2012/03/mengenal-jaringan-gsm-global-system-for-mobile-communication/, Diakses
3 Maret 2012.
[10] Muhammad Aulya(10110010) dkk, Tugas Mata Kuliah Komunikasi Data dan Jaringan Komputer,
http://repository.unikom.ac.id/repo/sector/
kampus/view/blog/key/5804/Teknologi-GSM.htm,
Diakses 4 April 2012.
[11] Margaret Rouse, What is Code-Division Multiple Access
(CDMA)?,http://searchtelecom.techtarget.com/definitio
n/CDMA, Diakses Agustus 2009.
[12] Elektro Indonesia, Pengertian CDMA dan GSM,
http://id.shvoong.com/exact-