• Tidak ada hasil yang ditemukan

DAFTAR PUSTAKA

N/A
N/A
Protected

Academic year: 2024

Membagikan "DAFTAR PUSTAKA"

Copied!
3
0
0

Teks penuh

(1)

66

DAFTAR PUSTAKA

Al-Qur’an dan Terjemahnya. (2004). Departemen Agama Republik Indonesia.Jakarta: Toha Putra.

Abd. Rahman Abd. Ghani. (2005). Mashaf Al-Quran Rasm Uthmani: Kajian Mengenai Keutamaan dan Keistimewaannya. Al-Bayan Journal of Al-Quran

& Al-Hadith, Vol. 3, pp. 15–30.

AbuKhousa, E., Mohamed, N., & Al-Jaroodi, J. (2012). e-Health Cloud:

Opportunities and Challenges. Future Internet, 4(3), 621–645.

https://doi.org/10.3390/fi4030621

Aini, Q., & Amrizal, V. (2019). Implementasi Iptables firewall pada Linux sebagai sistem Keamanan Jaringan yang Handal. JURNAL TEKNIK INFORMATIKA, 3(1). https://doi.org/10.15408/jti.v3i1.21

Alhomoud, A., Munir, R., Disso, J. P., Awan, I., & Al-Dhelaan, A. (2011).

Performance evaluation study of Intrusion Detection Systems. Procedia Computer Science, 5, 173–180. https://doi.org/10.1016/j.procs.2011.07.024

Arif, S. (2015). MANUSIA DAN AGAMA. Islamuna: Jurnal Studi Islam, 2(2), 149. https://doi.org/10.19105/islamuna.v2i2.659

Choi, Y. S., Oh, J. T., Jang, J. S., & Ryou, J. C. (2010). Integrated DDoS attack defense infrastructure for effective attack prevention. 2010 2nd International Conference on Information Technology Convergence and Services, ITCS 2010. https://doi.org/10.1109/ITCS.2010.5581263

Deka, G. C., & Das, P. K. (2017). Virtual Network With Virtual Router/Firewall Using Endian Firewall Community (EFW). https://doi.org/10.4018/978-1- 5225-2785-5.ch013

Dharani, H. I. U. J. (2015). Securing TCP/IP Stacks Using IP Tables. International Journal of Science and Research (IJSR), 4(3), 2049–2054.

Douglis, F., & Krieger, O. (2013). Virtualization. IEEE Internet Computing, Vol.

17, pp. 6–9. https://doi.org/10.1109/MIC.2013.42

Fajrin, F., & Sabiq, A. (2016). Private Cloud Menggunakan Proxmox Ve Pada Sistem. Jurnal Teknologi Informasi YARSI (JTIY), 3(1), 40–45.

Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care services. Journal of Medical Internet Research, Vol. 13.

https://doi.org/10.2196/jmir.1867

(2)

67

Lele, A. (2019). Cloud computing. In Smart Innovation, Systems and Technologies (Vol. 132, pp. 167–185). https://doi.org/10.1007/978-981-13-3384-2_10 Löhr, H., Sadeghi, A.-R., & Winandy, M. (2010). Securing the e-health cloud. 220.

https://doi.org/10.1145/1882992.1883024

Lu, S., Ranjan, R., & Strazdins, P. (2015). Reporting an experience on design and implementation of e-Health systems on Azure cloud. Concurrency Computation , 27(10), 2602–2615. https://doi.org/10.1002/cpe.3325

Masrur. (2017). Konsep Harta dalam Al-Qur’ān dan Ḥadīṡ. Jurnal Hukum Islam IAIN Pekalongan, 15(1), 95–128.

Muhammad, A. bin. (2008). Tafsir Ibnu Katsir. Pistola Imán Asy-Syafi’i, p. 558.

Onno W., P. (2008). Panduan Praktis Firewall Dengan IPTables. (April), 1–18.

Retrieved from http://linux2.arinet.org

Pardamean, B., & Rumanda, R. R. (2010). Integrated Model of Cloud-Based E- Medical Record for Health Care Organizations. Recent Researches in E- Activities, (June), 157–162.

Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015). Cloud computing features, issues, and challenges: A big picture. Proceedings - 1st International Conference on Computational Intelligence and Networks, CINE 2015, 116–

123. https://doi.org/10.1109/CINE.2015.31

Ramadhani, E. (2015). Desain E- Health : Sistem Keamanan Aplikasi E- health Berbasis Cloud Computing. Seminar Nasional Informatika Medis, 50–57.

Rodrigues, J. J. P. C., Sendra Compte, S., & de la Torra Diez, I. (2016). Cloud Computing on e-Health. In e-Health Systems (pp. 191–207).

https://doi.org/10.1016/b978-1-78548-091-1.50011-7

Singh, B., Mahajan, R., Panda, S. N., & Samra, G. S. (2016). Detecting DDOS Attacks in Cloud- A Novel. International Journal of Computer Science and Information Security (IJCSIS), 14(5), 292–298.

Suricata. (2017). Suricata Open Source IDS / IPS / NSM engine. Retrieved from https://suricata-ids.org website: https://suricata-ids.org/%0Ahttps://suricata- ids.org/%0Ahttp://suricata-ids.org

Syatibi, & Ahmad. (2016). Ahammiyah al-Balagah al-’Arabiyah fi tafsir al-Qur’an.

Insaniyat: Journal of Islam and Humanities, 1(1), 57–75

Utari, S.S., Haryanti, S.C., Rachmawati, U.A., Atmoko, S.P.U., Suhartanto, H.

(2017). Implementation of Virtual Firewall Mechanism for Security of Indonesian E - Health Cloud Model Pseudocode of IP Address Filtering Future Work. 1(5).

(3)

68

Yang, B. (2013). Firewall. In Information Assurance and Security Technologies for Risk Assessment and Threat Management (pp. 204–227).

https://doi.org/10.4018/978-1-61350-507-6.ch008

Referensi

Dokumen terkait

Additionally, a good firewall product will incorporate both dynamic packet filtering and proxy technology in order to provide the highest level of security and flexibility.. Should

Proceedings of Indonesian Petroleum Association 27th Annual Convention..

Analisis Pengaruh Technology Readiness terhadap Perceived Usefulness dan Perceived Ease of Use terhadap Behavioral Intention dari Quick Response Indonesian Standard

RELATED RESEARCH WORKS The security of utilizations manages the assurance of mobile applications or mobile application models, which utilize the Cloud assets to offer better types of

SDN Algorithm 2 Recever’s Protocol: Cloud Tenant’s Network and Firewall Definition INPUT: Let VM2 of ipv6-address=DST on hypervisor DH be a communication destination to respond to a

Polymorphisms of promoter and coding regions of the arylamine N- acetyltransferase 2 NAT2 gene in the Indonesian population: proposal for a new nomenclature.. Journal of Human

Oral health status and oral health-related quality of life in Indonesian elderly Analysis using the Indonesian Version of the Oral Health Assessment Tool and the Geriatric Oral Health

Identifikasi dalam obat bentuk sediaan tablet menggunakan metode fourier transform infrared FTIR spectroscopy.. Indonesian journal of