Items where Subject is "T Technology > TA Engineering (General). Civil engineering (General)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | D | E | F | G | I | J | M | N | O | P | R | S | T | V | W | Y
Number of items at this level: 48.

A

Aris Pratiwi, aris Aris Pratiwi_09031181520121 Laporan Penetration Testing. Aris Pratiwi_09031181520121 Laporan Penetration Testing.

Aris Pratiwi, aris Aris Pratiwi_09031181520121_Task_2. Aris Pratiwi_09031181520121_Task_2.

aulia, melynda TUGAS1_09011281722066_AULIAMELYNDAPUTRI. TUGAS1_09011281722066_AULIAMELYNDAPUTRI. (Submitted)

D

Dwi, Maretta Sistem Pendukung Keputusan Penentuan Jurusan Siswa di SMA Negeri 2 Lubuklinggau. Sistem Pendukung Keputusan Penentuan Jurusan Siswa di SMA Negeri 2 Lubuklinggau dengn Metode Fuzzy Inference Mamdani.

E

ERDA, JULIAN LESI PRODUK NMS DAN FITURNYA 09011181419065 TUGAS MANAJEMEN JARINGAN. PRODUK NMS DAN FITURNYA. (In Press)

F

FIRDAUS, AHMAD POSTER MANAJEMEN KEAMANAN INFORMASI. [Image]

G

Gonewaje, Govi (2016) [TASK 1]Draw Your Concept of the Internet Now. [TASK 1]Draw Your Concept of the Internet Now.

Gonewaje, Govi (2016) [TASK 2]Identify the Hop of Web Server IIX and USA. [TASK 2]Identify the Hop of Web Server IIX and USA.

Gonewaje, Govi (2016) [TASK 3]Difference of LAN, MAN and WAN. [TASK 3]Different of LAN, MAN and WAN.

Gonewaje, Govi (2016) [TASK 4]Identifying Network Devices, Devices and Configure with Cisco Packet Tracer. [TASK 4]Identifying Network Devices, Devices and Configure with Cisco Packet Tracer.

Gonewaje, Govi (2016) [TASK 5]Using Wireshark and Command "netstat -a" to Know About Network Traffic. [TASK 5]Using Wireshark and Command "netstat -a" to Know About Network Traffic.

Gonewaje, Govi Task 2 - Common Vulnerabilities and Exposures of Nginx. Task 2 - Common Vulnerabilities and Exposures of Nginx.

Gonewaje, Govi (2016) [Task 6}Identification the Name Server (NS) from Two Different Websites. [Task 6}Identification the Name Server (NS) from Two Different Websites.

Gonewaje, Govi (2016) [Task 7]Why IP Address 127 (127.x.x.x) Can’t be Used? [Task 7]Why IP Address 127 (127.x.x.x) Can’t be Used?.

I

Indah Frisilina, Indah IP Pada Jaringan. IP Pada Jaringan.

Indah Frisilina, Indah LAN (Local Area Network). LAN (Local Area Network).

Indah Frisilina, Indah Wireshark. Ananlisis Perbandingan Wireshark dengan Command Prompt.

J

Johan Wahyudi, Joe [Johan Wahyudi] ITIL Strandar Kualitas Pelayanan IT. [Johan Wahyudi] ITIL Strandar Kualitas Pelayanan IT.

julian lesi, erda Analisa FCAPS Laporan Kerja Praktik. Analisa FCAPS Laporan Kerja Praktik.

julian lesi, erda TUGAS MANAJEMEN JARINGAN. SNMP dengan Cisco Packet Tracer.

julian lesi, erda quis manajemen jaringan. QUIS MANAJEMEN JARINGAN.

M

M. Hari Fadhlurrohman, Hari Analysis of SNMP Using Wireshark and Monitoring Using PRTG Traffic Grapher. Network Management.

Mardhiati, Sri UAS KEAMANAN JARINGAN KOMPUTER : Wardriving. UAS KEAMANAN JARINGAN KOMPUTER.

N

Nadya Damayanti, Nadya (2017) layanan protokol tcp dan udp. layanan protokol udp dan tcp. (Unpublished)

Novriansyah, Novriansyah JARAK. JARAK. (Submitted)

Nuria Nabilah, Nabil Poster Manajemen Kemananan Informasi. [Image]

Nuria Nabilah, Nabil Tugas Wardriving. MKI.

O

Orien Patriana, Orien review Penerapan Data Mining Untuk Evaluasi Kinerja Akademik Mahasiswa Menggunakan Algoritma Naive Bayes Classifier. review Penerapan Data Mining Untuk Evaluasi Kinerja Akademik Mahasiswa Menggunakan Algoritma Naive Bayes Classifier.

P

Prayudha, Yoppy LinkSmart. Internet-of-Things platforms. (Submitted)

padhli maulana, padhli maulana portal. [Image]

R

Richo, annajmawan (2016) On Technical Security Issues in Cloud Computing. On Technical Security Issues in Cloud Computing.

Robbi Anggara Pranata, Robi Task_2_KOMDAT_09041181520011. Task 2 Komdat.

rido, rahmat Skenario Hacking. skenario hacking.

rido rahmat, rido Produk dan Feature dari Network Monitoring System (NMS). Produk dan Feature dari Network Monitoring System (NMS). (Unpublished)

rido rahmat, rido jaringan komputer_task4. task4.

rido rahmat, rido mencari informasi target dan hole pada target. mencari informasi target dan Tingkat Hole.

rido rahmat, rido rahmat jaringan komputer_task2. Task2.

rido rahmat, rido rahmat skenario hacking ubuntu. skenario hacking ubuntu.

rido rahmat, rido rahmat and rido rahmat, rido rahmat jaringan komputer_task1. Task1.

S

sarah, fauliah tas 1 manjar produk dan fitur-fitur dari NMS. tas 1 manjar produk dan fitur-fitur dari NMS. (In Press)

T

Tarigan, Pascal Review Framework Dashboard Monitoring System Berbasis Web Sebagai Pemantau Layanan liteBIG Instant Messenger. Review Framework Dashboard Monitoring System Berbasis Web Sebagai Pemantau Layanan liteBIG Instant Messenger.

Tarigan, Pascal Tugas KJK 2 Scanning Port. Scanning Port.

Tarigan, Pascal Wardriving use Kismed and WiGLE WIFI. [Image]

Tiara Nur Azmi, Tiara SCANNING NMAP. SCANNING NMAP.

Tiara Nur Azmi, rara Security Testing Methodology. Security Testing Methodology.

V

Vito.A.M.A, vito Komputer Forensik UAS. autopsy.

W

Wahyuni Cahnia Sari, wcs Tugas UAS MTI Poster Design Business IT Case in Smart Product of Industry Revolution 4.0. Tugas UAS MTI Poster Design Business IT Case in Smart Product of Industry Revolution 4.0..

Y

yoga faturahman, yoga YOGA FATURAHMAN_09040581721006_KEAMANAN JARINGAN KOMPUTER_reconnaisance and scanning. reconnaisance and scanning. ISSN .

This list was generated on Sat Dec 28 01:17:53 2024 WIB.