• Tidak ada hasil yang ditemukan

DAFTAR PUSTAKA

N/A
N/A
Protected

Academic year: 2024

Membagikan "DAFTAR PUSTAKA"

Copied!
3
0
0

Teks penuh

(1)

83

DAFTAR PUSTAKA

Ainissyifa, H. (2016). Pendidikan Karakter Dalam Perspektif Pendidikan Islam. Edukasi, 4(1), 1–25.

https://doi.org/10.5281/e-journal.v4i1.188

Aji Nugrogo, M. (2014). Pemanfaatan Teknologi Informasi dalam Peningkatan Mutu Pendidikan Islam di Madrasah. Mudarrisa: Jurnal Pendidikan Islam, 6(1).

Anggraeni, F., Ilmukesehatan, F., & Surakarta, U. (2019). Pengaruh Deep Transverse Friction Terhadap Penurunan Nyeri Leher Pada Pengemudi Ojek Halaman Persetujuan Pengaruh Deep Transverse Friction Terhadap Online. Pengaruh Deep Transverse Friction Terhadap Penurunan Nyeri Leher Pada Pengemudi Ojek Halaman Persetujuan Pengaruh Deep Transverse Friction Terhadap Online.

Application, F., & Data, P. (2008). ( 12 ) United States Patent. 2(12).

Ghinulur S. O. (2019). Implementasi NIDS Berbasis Signature-based dengan Teknik Multithread untuk Model e-Health Cloud Indonesia serta Tinjauannya Menurut Agama Islam. Skripsi. Universitas Yarsi.

Haryanti, S.C., Pradipta, A., Atmoko, S.P.U., Rachmawati, U.A., & Suhartanto, H. (2017). Indonesian E - Health Community Cloud . Poster. SEAIP. 4-8 Desember 2017. Taiwan.

Hisyam, Z., Yogyakarta, U. A., Catur, C., & Yogyakarta, A. M. (2019). Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing. Majalah Ilmiah Bahari Jogja (MIBJ), 17(2), 1–9.

Ikhsan, M. (2017). Implementasi Augmented Reality Berbasis Cloud Computing Pada Buku Pelajaran Biologi SMU. UIN Alauddin Makassar.

Iswandi, A. (2015). Maslahat Memelihara Harta Dalam Sistem Ekonomi Islam. SALAM: Jurnal Sosial Dan Budaya Syar’i, 1(1). https://doi.org/10.15408/sjsbs.v1i1.1522

Jamil, M., Khairan, A., & Fuad, A. (2015). Implementasi Aplikasi Telemedicine Berbasis Jejaring Sosial dengan Pemanfaatan Teknologi Cloud Computing. Jurnal Edukasi Dan Penelitian Informatika (JEPIN), 1(1). https://doi.org/10.26418/jp.v1i1.9930

Joshi, B., Vijayan, A. S., & Joshi, B. K. (2012). Securing cloud computing environment against DDoS attacks. 2012 International Conference on Computer Communication and Informatics, ICCCI 2012.

https://doi.org/10.1109/ICCCI.2012.6158817

Kaur, Tejvir Malhotra, Vimmi Singh, D. (2014). Comparison of network security tools-Firewall, Intrusion Detection System and Honeypot. International Journal of Enhanced Research in Science

(2)

84

Technology & Engineering, 3(2), 200–204.

Kovari, A., & Dukan, P. (2012). KVM & OpenVZ virtualization based IaaS open source cloud virtualization platforms: OpenNode, Proxmox VE. 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics, SISY 2012, 335–339.

https://doi.org/10.1109/SISY.2012.6339540

Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care services.

Journal of Medical Internet Research, 13(3). https://doi.org/10.2196/jmir.1867

Kurniawan, E. (2015). PENERAPAN TEKNOLOGI CLOUD COMPUTING DI UNIVERSITAS Studi Kasus : Fakultas Teknologi Informasi UKDW. Eksis, Vol. 08, pp. 29–36.

Liu, X., Peng, L., & Li, C. (2011). The dynamic Honeypot design and implementation based on Honeyd.

Communications in Computer and Information Science, 214 CCIS(PART 1), 93–98.

https://doi.org/10.1007/978-3-642-23321-0_14

Mahmudi, M. (2019). Pendidikan Agama Islam Dan Pendidikan Islam Tinjauan Epistemologi, Isi, Dan Materi. TA’DIBUNA: Jurnal Pendidikan Agama Islam, 2(1), 89.

https://doi.org/10.30659/jpai.2.1.89-105

Mardiyanto, B., Indriyani, T., Suartana, I. M., & Kunci, K. (2016). Analisis Dan Implementasi Honeypot Dalam Mendeteksi Serangan Distributed Denial-Of-Services (DDOS) Pada Jaringan Wireless.

Integer Journal, 1(2), 32–42.

Masdari, M., Nabavi, S. S., & Ahmadi, V. (2016). An overview of virtual machine placement schemes in cloud computing. Journal of Network and Computer Applications, 66(January), 106–127.

https://doi.org/10.1016/j.jnca.2016.01.011

Mell, P., & Grance, T. (2011). The NIST-National Institute of Standars and Technology- Definition of Cloud Computing. NIST Special Publication 800-145, 7.

Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42–57.

https://doi.org/10.1016/j.jnca.2012.05.003

Patil, R., Dudeja, H., Gawade, S., & Modi, C. (2018). Protocol specific Multi-threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDos Attack Detection in Cloud. Communication and Networking Technologies (ICCCNT), (1), 430–439.

Qoim Abdullah, S., Thohari, F., Mahsun, M., Hariadi, H., Al-Farizi, M., Fitriani, R., … Mustaqim, M.

(2015). AL-MABSUT. Integrasi Konsep Islam Dalam Konteks Promosi Kesehatan, 9(2089–3426), 88.

Reese, G. (2007). MySQL pocket reference. vi, 126 p.

(3)

85

Sandhitiyas Saiful Maarif. (2017). Implementasi Teknologi Cloud Storage ( Studi Kasus Kantor Kepala Desa Sidoharjo ). Eprints.Ums. Retrieved from http://eprints.ums.ac.id/id/eprint/49612

Sandi, M. (2019). Analisis dan Implementasi Honeypot untuk Model e-Health Cloud Security Serta Tinjauannya Menurut Agama Islam. Skripsi. Universitas Yarsi.

Saputra, A. (2012). Manajemen Basis Data Mysql Pada Situs FTP Lapan Bandung. Berita Dirgantara, 13(4), 155–162.

Singh, R. K., & Ramajujam, T. (2009). Intrusion Detection System Using Advanced Honeypots.

International Journal of Computer Science and Information Security IJCSIS, 2(1), 9. Retrieved from http://arxiv.org/abs/0906.5031

Suryono, T., & Afif, M. F. (2012). Pembuatan Prototype Virtual Server Menggunakan Proxmox Ve Untuk Optimalisasi Resource Hardware Di. IJNS-Indonesian Journal on Networking and Security, 1(November), 1–5.

SYARIF HAWARI, M. (2016). Penerapan Iptables Firewall Pada Linux Dengan Menggunakan Fedora.

Jurnal Manajemen Informatika, 6(1), 198–207.

Taylor, A. G. (2013). SQL For Dummies. Journal of Chemical Information and Modeling, 53(9), 1689–

1699. https://doi.org/10.1017/CBO9781107415324.004

Utari, Sarah S. (2018). Implementasi Mekanisme Virtual Firewall untuk Model e-Health Cloud Security serta Tinjauannya Menurut Agama Islam. Skripsi. Universitas Yarsi.

Valli, C. (2010). Journal of Digital Forensics , Security and Law Developing VoIP Honeypots : a Preliminary Investigation into Malfeasant Activity Developing VoIP Honeypots : a Preliminary Investigation into Malfeasant Activity. 5(2).

Xuan, L. F., & Wu, P. F. (2015). The optimization and implementation of iptables rules set on linux.

Proceedings - 2015 2nd International Conference on Information Science and Control Engineering, ICISCE 2015, 988–991. https://doi.org/10.1109/ICISCE.2015.223

Referensi

Dokumen terkait