Minggu, 28 Oktober 2012

LAPISAN PRESENTASI


LAPISAN PRESENTASI
DAFTAR ISI
Halaman
Halaman Judul ........................................................................................................................... i
KataPengantar .............................................................................................................................ii
DaftarIsi ..................................................................................................................................... iii
BAB I  PENDAHULUAN
1.1       Latar Belakang ...................................................................................................1
1.2       Rumusan masalah ..............................................................................................1
1.3       Tujuan Penelitian ...............................................................................................1
BAB II LANDASAN TEORI
            2.1       Presentation Layer............................................................................................. 2
2.2       Layanan Presentation Layer.............................................................................. 2
            2.2.1    Presentasi Data ..................................................................................................2
            2.2.2    Kompresi Data .................................................................................................. 3
            2.2.3    Keamanan Dan Kerahasian Jaringan .................................................................6
            2.2.4    Keamanan Dan Kerahasian Internet ................................................................15
2.2.5    Integritas Pengiriman Data ............................................................................. 18
2.2.6    Kelemahan dan kerahasiaan system computer……………………………….22

2.3       Mempercayai Password : Network Authentication.......................................................28
            2.3.1    Resiko Keamanan Inbound Service .................................................................28
            2.3.2    Mekanisme Autentikasi ....................................................................................30
            2.3.3    Kerberos Dan TIS-FWTK Authentication Server ............................................31
BAB III PENUTUP
            3.1       Kesimpulan .......................................................................................................32
3.2         Daftar Pustaka………………………………………………………………...33
dr makalah sendiri,maaf klau ada kesamaan.

Tidak ada komentar:

Posting Komentar