Pengembangan Sistem Keamanan Komputer Mengakses Data Center Menggunakan Algoritma Rsa Pada Windows Server 2012 Dalam Media Hotspot

DAFTAR PUSTAKA

Ali, I. & Meghanathan, N. 2011. Virtual Machines And Networks – Installation
Performance Study Advantages And Virtualization Options. International
Journal of Network Security & Its Application3(1):1-15.
Al-Rayes, H.T. 2012. Studying Main Differences Between Linux & Windows
Operating Systems. International Journal of Electrical & Computer
Sciences12(4):25 – 31.
Ayele, A.A. & Sreenivasarao, V. 2013. A Modified RSA Encryption Technique Based
On Multiple Public Keys. International Journal Of Innovative Research In
Computer And Communication Engineering1(4): 859-864.
Bilal, K., Khan, S.U., Kolodziej, J., Zang, L., Hayat, K., Madani, S.A., -Allah, N.M.,
Wang, L. & Chen, D. 2012. A Comparative Study Of Data Center Network
Architektures. Proceedings of 26nd European Conference On Modeling And
Simulation, pp. 1-7.
Bisong, A. & Rahman, S.M. 2011. An Overview Of The Security Concerns In
Enterprise Cloud Computing. International Journal of Network Security & Its
Applications (IJNSA)3(1): 30-45.
Boja, C. 2011. Security Survey Of Internet Browsers Data Managers. Journal Of
Mobile Embedded And Distributed Systems. 3(3): 109-119.
Cartealy, I. 2012. Tips & Trik Mikrotik Router OS untuk SOHO. Andi Offset:

Yogyakarta.
Choi, M.-K., Robles, R.J., Hong, C.-H. & Kim, T.-H. 2008. Wireless Network
Security Vulterabilities Threats And Contermeasures. International Journal Of
Multimedia And Ubiquitous Engineering3(3):77-86.
Darmawan, E., Purnama, I., Mahardika, T.I.R., & Wicaksana, W.S. 2012. Bandwidth
Manajemen Queue Tree VS Simple Queue. Konferensi Nasional Sistem
Informasi. pp-642-647.
Devi, P.A., Laskhmi, S.R. & Sathiyavaishnavi, K. 2013. A Study On Network
Security Aspects And Attacking Methods. International Journal Of P2P
Network Trends And Technology3(2):97-103.
Fuertes, W., Zambrano, P., Sanchez, M. & Gamboa, P. 2011. Alternative Engine to
Detect and Block Port Scan Attacks Using Virtual Network Environments.
International Journal of Computer Science and Network Security11(11):14-23.
http://datacenterindonesia.co.id/manfaat-layanan-data-center-untuk-bisnis/ (diakses:
29 Nopember 2014)
Jamgekar, R. S. & Joshi, G. S. 2013. File Encryption And Decryption Using Secure
RSA. International Journal Of Emerging Science And Engineering
(IJESE)1(4):11-14.
Kazan, H.F., Perneel, Luc. & Timmerman, M. 2013. Benchmarking The Performance
Of Microsoft Hyper-V Server Vmware ESXi And Hypervisors. Journal Of

Emerging Trends In Computing And Information Sciences 4(12):922-933.

Kolo, J.G. & Dauda, U.S. 2008. Network Security Policies And Guidelines For
Effective Network Management. Leonardo Journal Of Sciences 13:7-21.
Park, J. 2013. A Study On Detection Of Hacking And Malware Codes In Bare Metal
Hypervisor For Virtualized Internal Environment Of Cloud Service.
International Journal Of Computer Science And Network Security13(10):78-82.
Puspitasari, N.F. 2007. Implementasi Mikroik sebagai Solusi Router Murah dan
Mudah. Seminar Nasional Teknologi. pp-D-1 - D-14.
Rona, K. 2010. A Study on Comparison of the Mikrotik And Windows Server
Operating System. Proceeding of European Conference On Modeling And
Simulation, pp. 1-5.
Sakib, A. K. M., Ahmed, S., Rahman, S., Mahmud, I. Belali, M. H. 2012. WPA 2 WiFi Protected Access 2 Security Enhancement Analysis & Improvement. Global
Journal Of Computer Science And Technology12(6):1-9.
Saliu, A.M., Kolo, M.I., Muhammad, M.K. & Nafiu, L.A. 2013. Internet
Authentication and Billing (Hotspot) System Using Mikrotik Router Operating
System. International Journal of Wireless Communications and Mobile
Computing1(1):51-57.
Sharma, S., Singh, G. & Singh, P. 2013. Security Enhancing of a LAN Network Using
Hardening Technique. International Journal of Innovative Technology and

Exploring Engineering2(3):174-181.
Singelée, D. & Preneel, B. 2005. The Wireless Application Protocol. International
Journal Of Network Security1(3): 161-165.
Singh, G. 2012. Security Issues In Wireless Local Area Networks (WLAN). Global
Journal of Science Frontier Research12(11):1-12.
Sumarno, E. & Hasmoro, H.P. 2013. Implementasi Metode Load Balancing dengan
Dua Jalur. Indonesian Jurnal on Networking and Security2(1):28-34.
Technet.microsoft.com/en-us/library/dn250019.aspx (diakses: 19 November 2014)
Towidjojo, R. 2013. Mikrotik Kung Fu. Jilid 1. Jasakom: Jakarta Utara.
Towidjojo, R. 2013. Mikrotik Kung Fu. Jilid 2. Jasakom: Jakarta Utara.
Uprit, A. 2014. Network Security Using Linux Unix Firewall. International Journal of
Scientific Engineering and Technology3(3):306-309.
Xiao, Y., Bandela, C., Du, X.J., Pan, Y. & Dass, E.K. 2006. Security Mechanisms
Attacks And Security Enhancements For The IEEE 802.11 WLANs.
International Journal Wireless And Mobile Computing1(3):276-288.
Yadav, P. S., Yadav, K. P. & Sharma, P. 2012. Implementation Of RSA Algorithm
Using Elliptic Curve Algorithm For Security And Performance Enhancement.
International Journal Of Scientific & Technology Research 1(4):102-105.