Items where Subject is "A General Works > AI Indexes (General)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: Article | Image | Experiment | Other
Number of items at this level: 158.

Article

ADRIAN AJISMAN, 0901128120133 Layanan dari TCP dan UDP Protocol. Layanan dari UT dan TCP Protocol. (Submitted)

Andre Ghazali Armi, Ghazali Tugas KJK Membandingkan tor dan tool lainnya. TOR.

Ardin, Febrianda NMS. NMS. (Submitted)

Bhayyu, Vicko Cracking Password Windows. Cracking Password Windows. (Unpublished)

CITRASORAYA, DYAH THREATSCAPE INTRODUCT AND OVERVIEW. THREATSCAPE INTRODUCT AND OVERVIEW.

Caroline, Cynthia ITIL Event Management. ITIL Event Management. (Unpublished)

Eka Prasetyo Ariefin, Eka Ariefin Tugas Metologi Penelitan. Tugas Metologi Penelitan_09031281722044_Eka Prasetyo Ariefin_SI4B.

Fepiliana, Fepi Network Security: scanning website unair.ac.id. Network Security: Scanning Website unair.ac.id.

Gustifa, Ratih Analisa Pengujian Teknik Reconnaissance Pada Website Stationary.co.id. Analisa Pengujian Teknik Reconnaissance Pada Website Stationary.co.id. (Unpublished)

Gustifa, Ratih Malware. Malware. (Unpublished)

Gustifa, Ratih Memilih dan Memahami Tool Manajemen Network. Memahami dan Memilih Tool Manajemen Network. (Unpublished)

Gustifa, Ratih tugas kapita selekta ) social impact internet of things. tugas kapita selekta , IoT. (Unpublished)

Indah Irawati Pardede, Indah TUGAS MTI 1. Penerapan Knowledge Discovery in Database (KDD) di sebuah Toko Handphone.

Indah Irawati Pardede, Indah TUGAS MTI 1. Penerapan Knowledge Discovery in Database (KDD) di sebuah Toko Handphone.

Jan William Tarigan, Jan Etika dalam WarDriving. Etika dalam WarDriving.

Jan William Tarigan, Jan Mendeskripsikan layanan-layanan yang running dengan TCP dan UDP. Mendeskripsikan layanan-layanan yan running dengan TCP dan UDP.

Juanda Fahrizal, Juanda Tugas Keamanan Jaringan Komputer Scanning. Scanning Keamanan Jaringan Komputer.

Juanda Fahrizal, Juanda Tugas Poster Wardriving dan Laporan Wardriving. Wardriving using Wigle WI-FI.

Juanda Fahrizal, Juanda Tugas analisa trojan FTP. Analisa trojan FTP.

MUHAMMAD, FACHRURROJI scanning. scanning.

Muhammad Imam Utama, Imam Tugas Metodologi Penelitian "Decision Support System". Tugas Metodologi Penelitian.

Noorfizir, Arfattustary Capturing Data. Tugas Jaringan Komputer. (Unpublished)

Noorfizir, Arfattustary Ethernet's Rules. Tugas Jaringan Komputer. (Unpublished)

Noorfizir, Arfattustary (2017) Layanan Protokol TCP & UDP. Tugas Jaringan Komputer. pp. 1-2. (Unpublished)

Noorfizir, Arfattustary Subnet Troubleshooting Game. Subnet Troubleshooting Game.

Noorfizir, Arfattustary Threatscape Introduction and Overview. Threatscape Introduction and Overview.

Noorfizir, Arfattustary (2017) Visualisasi dan Analisis pcap File Menggunakan Aplikasi Rumint. Tugas Jaringan Komputer. pp. 1-6. (Unpublished)

Noviyanti, Nadya Rahma Analisa TOR Browser menggunakan Wireshark. Keamanan Jaringan Komputer. ISSN 1

Noviyanti, Nadya Rahma Design for The Network Node Monitoring System Based On ZigBee Technology. Network Management.

Noviyanti, Nadya Rahma DoS Attacks, Spoofing, Smurf Attacks, and Phishing. DoS Attacks, Spoofing, Smurf Attacks, and Phishing.

Noviyanti, Nadya Rahma Http Trojan Anysis. Keamanan Jaringan Komputer. ISSN 1

Noviyanti, Nadya Rahma Poster Wardriving. Keamanan Jaringan Komputer. ISSN 1

Noviyanti, Nadya Rahma Reconnaissance Website. Keamanan Jaringan Komputer. ISSN 1 (Unpublished)

Noviyanti, Nadya Rahma Scanning Domain Menggunakan Tool NMap. Keamanan Jaringan Komputer. ISSN 1

Noviyanti, Nadya Rahma Subnet Troubleshoting game. Tugas Jaringan Komputer.

Noviyanti, Nadya Rahma Tugas Jaringan Komputer. PCAP Visualisation. ISSN 1 (Unpublished)

Noviyanti, Nadya Rahma Wardriving menggunakan Tools Wigle dan Mapping menggunakan Google Earth. Keamanan Jaringan Komputer. ISSN 1

Rafli Eggy Ilham, Eggy (2019) Tugas keamanan jaringan vulnerability dan reconnaissance. Tugas keamanan jaringan Vulnerability and reconnaissance website.

Rahma, Nadya Contoh Rules Network. Contoh Rules Network. (Unpublished)

Ratih, Handayani Tugas Keamanan Jaringan Komputer. tugas kemananan jaringan komputer_analisa forensik file jpg/video.

Ratih, Handayani keamanan jaringan komputer-cracking password. keamanan jaringan komputer.

Ria Siti, Juairiah Analisa Dan visualisasi PCAP SNMP Menggunakan Wireshark dan Orange. Network Management.

Ririn, Sapitri Tugas Metodologi Penelitian (E-Governance). Qualititative and Quantitative of E-Governace.

Rizqy, Rizqy Zurriyati (2018) ANALISIS INTEGRASI DATA PADA PDKI INDONESIA MENGENAI PATEN DAN MEREK MELALUI SINTA. ANALISIS INTEGRASI DATA PADA PDKI INDONESIA MENGENAI PATEN DAN MEREK MELALUI SINTA. (Submitted)

Rofby Hidayadi, 09011281520132 (2018) Analisis Common Vulnerability and Exposures (CVE) - CVE-2017-17615. Analisis Common Vulnerability and Exposures (CVE) - CVE-2017-17615.

Rofby Hidayadi, 09011281520132 (2017) Capturing dan Analisa Paket Data menggunakan Wireshark dan Command Prompt. Capturing dan Analisa Paket Data menggunakan Wireshark dan Command Prompt. 0-18.

Rofby Hidayadi, 09011281520132 (2018) Case Hacking - Bank Sentral Bangladesh (2016). Case Hacking - Bank Sentral Bangladesh (2016).

Rofby Hidayadi, 09011281520132 (2018) Conceptual Design - ER Diagram HIMASISKO Database System. Conceptual Design - ER Diagram HIMASISKO Database System.

Rofby Hidayadi, 09011281520132 (2018) Forensik Video dengan Metadata Analisis, Frame Analisis, dan Pixel Analisis. Forensik Video dengan Metadata Analisis, Frame Analisis, dan Pixel Analisis.

Rofby Hidayadi, 09011281520132 Hacking Password Windows. Hacking Password Windows.

Rofby Hidayadi, 09011281520132 Hacking Password Windows dengan USB Flash Drive melalui BIOS Menu. Hacking Password Windows dengan USB Flash Drive melalui BIOS Menu.

Rofby Hidayadi, 09011281520132 (2018) Laporan 1 Praktikum Antarmuka dan Peripheral. Laporan 1 Praktikum Antarmuka dan Peripheral.

Rofby Hidayadi, 09011281520132 Mapping CVE - Facebook. Mapping CVE - Facebook.

Rofby Hidayadi, 09011281520132 (2018) Perancangan Sistem Pengenalan Pola Wajah Menggunakan Webcam dengan Metode Principal Component Analysis (PCA). Perancangan Sistem Pengenalan Pola Wajah Menggunakan Webcam dengan Metode Principal Component Analysis (PCA).

Rofby Hidayadi, 09011281520132 (2017) Protokol Jaringan Komputer (CSMA/CD). Protokol Jaringan Komputer (CSMA/CD). 0-2.

Rofby Hidayadi, 09011281520132 Reconnaissance Network Security - Facebook. Reconnaissance Network Security - Facebook.

Rofby Hidayadi, 09011281520132 (2017) Subnetting Game Cisco. Subnetting Game Cisco.

Rofby Hidayadi, 09011281520132 (2017) Visualisasi PCAP Dataset menggunakan Rumint. Visualisasi PCAP Dataset menggunakan Rumint. 0-9.

SORAYA, DYAH CITRA Analisis Protokol SNMP pada Wireshark dengan Jaringan Wifi Public. Analisis Protokol SNMP pada Wireshark dengan Jaringan Wifi Public.

SORAYA, DYAH CITRA Contoh rule pada network. Contoh rule pada network. (Unpublished)

SORAYA, DYAH CITRA Framework dari jurnal Studies on Network Management System Framework of Campus Network. Studies on Network Management System Framework of Campus Network.

SORAYA, DYAH CITRA (2017) LAYANAN PROTOCOL TCP DAN UDP. Tugas Jaringan Komputer, 1 (1). pp. 1-2. ISSN 1 (Unpublished)

SORAYA, DYAH CITRA Subnet Trouble Shooting Game. Subnet Trouble Shooting Game.

SORAYA, DYAH CITRA Tugas KBJK Scanner. Scanner.

SORAYA, DYAH CITRA Tugas KJK Wardriving. Wardriving.

SORAYA, DYAH CITRA Tugas Keamanan Jaringan Komputer 1 Reconnaisance dan Vulnerability. Tugas Keamanan Jaringan Komputer 1 Reconnaisance dan Vulnerability.

SORAYA, DYAH CITRA Tugas Keamanan Jaringan Komputer perbandingan TOR dan Tools lainnya. Perbandingan TOR dan Tools lainnya.

SORAYA, DYAH CITRA (2017) Visualisasi dan Analisis pcap File Menggunakan Aplikasi Rumint. Visualisasi dan Analisis pcap File Menggunakan Aplikasi Rumint. (Unpublished)

SORAYA, DYAHCITRA Tugas Jarkom Capturing Data. CAPTURING DATA.

Siti Juairiah, Ria ANALISA DAN VISUALISASI PCAP PROTOCOL SNMP DENGAN MENGGUNAKAN WIRESHARK DAN ORANGE. Network Management.

Siti Juairiah, Ria (2017) Algoritma Pengendali Kemacetan Aliran Data ICMP. Tugas Jaringan Komputer, 1 (1). pp. 1-5. ISSN 1 (Unpublished)

Siti Juairiah, Ria (2017) Analisa Lalu Lintas Jaringan Komputer menggunakan Wireshark dan Command Prompt. Tugas Jaringan Komputer, 1 (1). pp. 1-7. ISSN 1 (Unpublished)

Siti Juairiah, Ria CVE-2014-0521. CVE-2014-0521 Attack Adobe Reader and Acrobat via Crafted PDF.

Siti Juairiah, Ria Cisco video review : The Evolution of Cyber Attacks. The Evolution of Cyber Attacks.

Siti Juairiah, Ria Cracking Password pada Windows Menggunakan Cain & Abel (Dictionary Attack). Keamanan Jaringan Komputer.

Siti Juairiah, Ria Cracking Windows 10 Password menggunakan Lazesoft via USB (Boot Mode). Keamanan Jaringan Komputer.

Siti Juairiah, Ria (2018) Hack Story : The 2016 Dyn Cyberattack. Hack Story : The 2016 Dyn Cyberattack.

Siti Juairiah, Ria Image Forensics menggunakan FotoForensic. Digital Forensik.

Siti Juairiah, Ria Jenis Serangan Pada Adobe Acrobat Reader - CVE. Jenis Serangan Pada Adobe Acrobat Reader - CVE.

Siti Juairiah, Ria (2017) Layanan Protokol TCP dan UDP. Tugas Jaringan Komputer, 1 (1). pp. 1-4. ISSN 1 (Unpublished)

Siti Juairiah, Ria Rancang Bangun Aplikasi Monitoring Jaringan dengan Menggunakan Simple Network Management Protocol. Network Management.

Siti Juairiah, Ria Reconnaissance Network Security. Reconnaissance Network Security.

Siti Juairiah, Ria Subnetting Games Cisco. Subnetting Games Cisco. ISSN 4

Siti Juairiah, Ria (2017) Visualisasi Data Wireshark. Tugas Jaringan Komputer, 1 (4). pp. 1-5. ISSN 1

Siti Pebsya, Sya Analisis Traffic SNMP pada Wireshark menggunakan Wifi Public. Analisis Traffic SNMP pada Wireshark menggunakan Wifi Public.

Siti Pebsya, Sya (2017) Capturing Data. Capturing Data.

Siti Pebsya, Sya (2017) Contoh Rule Pada Network. Contoh Rule pada Network. (Unpublished)

Siti Pebsya, Sya (2018) Incident Management of ITIL. Incident Management of ITIL.

Siti Pebsya, Sya (2017) PCAP Visualisasi Wireshark. PCAP Visualisasi Wireshark. (Unpublished)

Siti Pebsya, Sya (2018) Poster : Analisis SNMP pada Wireshark menggunakan wifi public. Analisis SNMP pada Wireshark menggunakan wifi public.

Siti Pebsya, Sya (2018) Rancang Bangun Aplikasi Monitoring Jaringan Menggunakan SNMP (Simple NetworkManagement Protocol) dengan Sistem Peringatan Dini dan Mapping Jaringan. Rancang Bangun Aplikasi Monitoring Jaringan Menggunakan SNMP (Simple NetworkManagement Protocol) dengan Sistem Peringatan Dini dan Mapping Jaringan.

Siti Pebsya, Sya (2017) Subnetting Games Cisco. Subnetting Games Cisco.

Siti Pebsya, Sya Threatscape Introduction and Overview. Threatscape Introduction and Overview.

Siti Pebsya RS, SPRS (2017) Layanan Protocol UDP dan TCP. Tugas Jaringan Komputer. (Unpublished)

Tarigan, Pascal Analisa SNMP menggunakan Wireshark dengan MIB Browser. Menganalisis SNMP.

Tarigan, Pascal Adhi Kurnia PCAP Visualisation. PCAP Visualisation.

Therio, Anggara Threatscapes Introduction and Overview. Threatscapes Introduction and Overview. (Submitted)

Ulvi, Ulvi (2017) Capturing Data. Capturing Data.

Ulvi, Ulviyana Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public. Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public.

Ulvi, Ulviyana (2018) Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public. Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public.

Ulvi, Ulviyana (2018) Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public. Analisis Traffic SNMP pada Wireshark menggunakan Network Wifi Public.

Ulvi, Ulviyana (2018) Availability Management of Information Technology Infrastructure Library. Availability Management of Information Technology Infrastructure Library.

Ulvi, Ulviyana (2018) CVE (Common Vulnarebility and Exposures). CVE (Common Vulnarebility and Exposures).

Ulvi, Ulviyana (2018) Case Hacking. Case Hacking.

Ulvi, Ulviyana (2018) Ckracking password windows 8. Cracking password windows 8.

Ulvi, Ulviyana (2018) Cracking Password Windows. Cracking Password Windows.

Ulvi, Ulviyana (2018) Forensic image case. Forensic image case.

Ulvi, Ulviyana (2018) Implementasi Fault Management. Implementasi Fault Management.

Ulvi, Ulviyana (2018) Jenis Serangan Pada Microsoft Internet Explorer - CVE. Jenis Serangan Pada Microsoft Internet Explorer - CVE.

Ulvi, Ulviyana (2018) Reconnaissance Network Security. Reconnaissance Network Security.

Ulvi, Ulviyana (2017) Threatcape Introduction and Overview. Threatcape Introduction and Overview.

Ulviyana, Ulvi (2017) Layanan Protocol TCP dan UDP. Tugas Jaringan Komputer. (Unpublished)

Ulviyana, Ulvi (2017) PCAP Visualisasi Wireshark. PCAP Visualisasi Wireshark. (Unpublished)

Ulviyana, Ulvi Rule pada Network. Rule pada Network. (Unpublished)

Ulviyana, Ulvi (2017) subneting Games Cisco. Subneting Games Cisco.

Wahyuni Cahnia Sari, WCS Tugas 2 Mata Kuliah Managemen Teknologi Informasi tentang SINTA dan Scopus. Analisis Integrasi Data, Dashboard, Visual, Sistem Informasi Eksekutif dan Sistem Informasi Pendukung Keputusan pada Scopus yang terintegrasi ke SINTA.

adrian ajisman, adrian Aplikasi Pemantau Perangkat Jaringan Berbasis Web Menggunakan Protokol SNMP dan Notifikasi SMS. Aplikasi Pemantau Perangkat Jaringan Berbasis Web Menggunakan Protokol SNMP dan Notifikasi SMS.

adrian ajisman, adrian ajisman Capturing data dengan wireshark dan cmd netstat. capturing data dengan wireshark dan cmd netstat.

adrian ajisman, adrian ajisman Pcap Visualization with rumitn apps. pcap visualization with rumint apps.

adrian ajisman, adrian ajisman rules router csma. rules router csma.

anggara, Therio Layanan-layanan yang berjalan pada protokol UDP dan TCP. Layanan-layanan yang berjalan pada protokol UDP dan TCP.

at thoriq fitriansyah, thoriq Resume webinar Strategies to realism ITSM : IT Security management Perspective di brigttalk.com. Strategies to realism ITSM : IT Security management Perspective. (Unpublished)

fauliah, sara and faulia, sarah Konsep internet pada zaman sekarang. jaringan komputer. ISSN 09011181419011 (In Press)

imam, mustofa Scanning step for hack. Scanning step for hack. (Submitted)

jan willliam tarigan, JWT Wireshark,capture,Jaringan komputer. Wireshark,capture,Jaringan komputer.

sara, fauiah and faulia, sarah Task 6 jarkom introgasi web. computer science. ISSN 0901118141901190 (In Press)

sarah, fauliah and faulia, sara Task 1 jarkom konsep internet pada era sekarang. computer science. ISSN 09011181419011 (In Press)

sarah, fauliah and faulia, sarah Task 2 jarkom analisis visual route. computer science. ISSN 09011181419011 (In Press)

sarah, fauliah and faulia, sarah Task 3 jarkom Perbandingan LAN, MAN, dan WAN. computer science. ISSN 09011181419011 (In Press)

sarah, fauliah and faulia, sarah Task 4 jarkom identify network devices and network media. computer science. ISSN 09011181419011 (In Press)

sarah, fauliah and faulia, sarah Task 5 jarkom capturing dan analisis paket pada protokol jaringan dengan menggunakan wirshark. computer science. ISSN 09011181419011 (In Press)

sarah, fauliah and faulia, sarah Task 7 jarkom menggapa IP 127 tidak dapat digunakan (tugas pak tasmi). computer science. ISSN 09011181419011 (In Press)

yoga faturahman, yoga CALORIES. CALORIES. (Unpublished)

Image

Jan William Tarigan, Jan Etika Dalam WarDriving. [Image]

Meilina, 09031181621012 Tugas UAS MTI Poster "Digital Government : Public Service Innovation". [Image]

Muhammad Abdhufadillah, dul (2017) UAS MTI Sibil 7. [Image]

Noviyanti, Nadya Rahma Information Technology Infrastructure Library. [Image]

Ria Siti, Juairiah Poster Analisis dan Visualisasi SNMP Menggunakan Wireshark dan Orange. [Image]

SORAYA, DYAH CITRA Poster - Analisis Protokol SNMP pada Wireshark dengan Jaringan Wifi Public (Tugas Manajemen Jaringan). [Image]

SORAYA, DYAH CITRA Poster ITIL. [Image]

Siti Juairiah, Ria ITIL Incidents Infographic. [Image]

Siti Juairiah, Ria Poster : SNMP Analysis. [Image]

Tarigan, Pascal Poster Analisa SNMP. [Image]

Ulvi, Ulviyana (2018) Poster Hacking. [Image]

adrian ajisman, adrian service strategy ITIL (Information Technology Infrastructure Library). [Image]

sara putri fauliah, spf Poster OSI LAYER. [Image]

Experiment

Fahrul, Rozi Keamanan jaringan komputer tahap reconnaissence. [Experiment]

Other

: R.M. Fikriansyah Solihan, fikri flow. : R.M. Fikriansyah Solihan. (Unpublished)

Juanda Fahrizal, Juanda Tugas Keamanan Jaringan Reconnaissance. Juanda Fahrizal.

M.fikri ashari, fikri flow. M.Fikri ashari. (Unpublished)

NADIA RAHMADILAH, nadia flow. NADIA RAHMADILAH. (Unpublished)

Syahla Hanifa, hanifa flow. Syahla Hanifa. (Unpublished)

choyrima putri utami, choyrima bagan. choyrima. (Unpublished)

muhammad faris, faris flow. muhammad faris. (Unpublished)

prima, prima flow. prima. (Unpublished)

rahmad andreansyah, rahmad flow. rahmad andreansyah. (Unpublished)

yensi wulandari, yensi flow. yensi wulandari. (Unpublished)

yoga faturahman, yoga SISTEM MONITORING PENGUKURAN DATA ARAH DAN KECEPAT. yoga faturahman. (Unpublished)

This list was generated on Mon Nov 25 11:36:55 2024 WIB.