66
DAFTAR PUSTAKA
Al-Qur’an dan Terjemahnya. (2004). Departemen Agama Republik Indonesia.Jakarta: Toha Putra.
Abd. Rahman Abd. Ghani. (2005). Mashaf Al-Quran Rasm Uthmani: Kajian Mengenai Keutamaan dan Keistimewaannya. Al-Bayan Journal of Al-Quran
& Al-Hadith, Vol. 3, pp. 15–30.
AbuKhousa, E., Mohamed, N., & Al-Jaroodi, J. (2012). e-Health Cloud:
Opportunities and Challenges. Future Internet, 4(3), 621–645.
https://doi.org/10.3390/fi4030621
Aini, Q., & Amrizal, V. (2019). Implementasi Iptables firewall pada Linux sebagai sistem Keamanan Jaringan yang Handal. JURNAL TEKNIK INFORMATIKA, 3(1). https://doi.org/10.15408/jti.v3i1.21
Alhomoud, A., Munir, R., Disso, J. P., Awan, I., & Al-Dhelaan, A. (2011).
Performance evaluation study of Intrusion Detection Systems. Procedia Computer Science, 5, 173–180. https://doi.org/10.1016/j.procs.2011.07.024
Arif, S. (2015). MANUSIA DAN AGAMA. Islamuna: Jurnal Studi Islam, 2(2), 149. https://doi.org/10.19105/islamuna.v2i2.659
Choi, Y. S., Oh, J. T., Jang, J. S., & Ryou, J. C. (2010). Integrated DDoS attack defense infrastructure for effective attack prevention. 2010 2nd International Conference on Information Technology Convergence and Services, ITCS 2010. https://doi.org/10.1109/ITCS.2010.5581263
Deka, G. C., & Das, P. K. (2017). Virtual Network With Virtual Router/Firewall Using Endian Firewall Community (EFW). https://doi.org/10.4018/978-1- 5225-2785-5.ch013
Dharani, H. I. U. J. (2015). Securing TCP/IP Stacks Using IP Tables. International Journal of Science and Research (IJSR), 4(3), 2049–2054.
Douglis, F., & Krieger, O. (2013). Virtualization. IEEE Internet Computing, Vol.
17, pp. 6–9. https://doi.org/10.1109/MIC.2013.42
Fajrin, F., & Sabiq, A. (2016). Private Cloud Menggunakan Proxmox Ve Pada Sistem. Jurnal Teknologi Informasi YARSI (JTIY), 3(1), 40–45.
Kuo, A. M. H. (2011). Opportunities and challenges of cloud computing to improve health care services. Journal of Medical Internet Research, Vol. 13.
https://doi.org/10.2196/jmir.1867
67
Lele, A. (2019). Cloud computing. In Smart Innovation, Systems and Technologies (Vol. 132, pp. 167–185). https://doi.org/10.1007/978-981-13-3384-2_10 Löhr, H., Sadeghi, A.-R., & Winandy, M. (2010). Securing the e-health cloud. 220.
https://doi.org/10.1145/1882992.1883024
Lu, S., Ranjan, R., & Strazdins, P. (2015). Reporting an experience on design and implementation of e-Health systems on Azure cloud. Concurrency Computation , 27(10), 2602–2615. https://doi.org/10.1002/cpe.3325
Masrur. (2017). Konsep Harta dalam Al-Qur’ān dan Ḥadīṡ. Jurnal Hukum Islam IAIN Pekalongan, 15(1), 95–128.
Muhammad, A. bin. (2008). Tafsir Ibnu Katsir. Pistola Imán Asy-Syafi’i, p. 558.
Onno W., P. (2008). Panduan Praktis Firewall Dengan IPTables. (April), 1–18.
Retrieved from http://linux2.arinet.org
Pardamean, B., & Rumanda, R. R. (2010). Integrated Model of Cloud-Based E- Medical Record for Health Care Organizations. Recent Researches in E- Activities, (June), 157–162.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015). Cloud computing features, issues, and challenges: A big picture. Proceedings - 1st International Conference on Computational Intelligence and Networks, CINE 2015, 116–
123. https://doi.org/10.1109/CINE.2015.31
Ramadhani, E. (2015). Desain E- Health : Sistem Keamanan Aplikasi E- health Berbasis Cloud Computing. Seminar Nasional Informatika Medis, 50–57.
Rodrigues, J. J. P. C., Sendra Compte, S., & de la Torra Diez, I. (2016). Cloud Computing on e-Health. In e-Health Systems (pp. 191–207).
https://doi.org/10.1016/b978-1-78548-091-1.50011-7
Singh, B., Mahajan, R., Panda, S. N., & Samra, G. S. (2016). Detecting DDOS Attacks in Cloud- A Novel. International Journal of Computer Science and Information Security (IJCSIS), 14(5), 292–298.
Suricata. (2017). Suricata Open Source IDS / IPS / NSM engine. Retrieved from https://suricata-ids.org website: https://suricata-ids.org/%0Ahttps://suricata- ids.org/%0Ahttp://suricata-ids.org
Syatibi, & Ahmad. (2016). Ahammiyah al-Balagah al-’Arabiyah fi tafsir al-Qur’an.
Insaniyat: Journal of Islam and Humanities, 1(1), 57–75
Utari, S.S., Haryanti, S.C., Rachmawati, U.A., Atmoko, S.P.U., Suhartanto, H.
(2017). Implementation of Virtual Firewall Mechanism for Security of Indonesian E - Health Cloud Model Pseudocode of IP Address Filtering Future Work. 1(5).
68
Yang, B. (2013). Firewall. In Information Assurance and Security Technologies for Risk Assessment and Threat Management (pp. 204–227).
https://doi.org/10.4018/978-1-61350-507-6.ch008