The document lists 11 references used in a research paper or project. The references include books on software development processes, security penetration testing, PHP programming, and mobile commerce technology. Also referenced are articles on sniffers, MD5 hashing, and keystroke logging. The final 3 references are Wikipedia articles on lookup tables, MD5, and keystroke logging accessed between July and October 2009.
The document lists 11 references used in a research paper or project. The references include books on software development processes, security penetration testing, PHP programming, and mobile commerce technology. Also referenced are articles on sniffers, MD5 hashing, and keystroke logging. The final 3 references are Wikipedia articles on lookup tables, MD5, and keystroke logging accessed between July and October 2009.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document lists 11 references used in a research paper or project. The references include books on software development processes, security penetration testing, PHP programming, and mobile commerce technology. Also referenced are articles on sniffers, MD5 hashing, and keystroke logging. The final 3 references are Wikipedia articles on lookup tables, MD5, and keystroke logging accessed between July and October 2009.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Dhar, Summit. “Sniffers – Basic and Detection”. Reliance Infocomm. 2002.
Ivar Jacobson, Grady Booch, and Jim Rumbaugh. “Unified Software Development Process”. Addison-Wesley, 2002. Klevinsky, T.J dan Scott Laliberte. “Hack I.T. – Security Through Penetration Testing”. Addison-Wesley. 2002. M. Farid Azis. “Belajar Sendiri Pemrograman PHP 4 Bagi Web Programmer”. PT Elex Media Komputindo, Jakarta, 2001. Philippe Kruchten. A Rational Development Process, “CrossTalk”, vol 9 (7), STSC, Hill AFB, UT, hal.11-16. Philippe Kruchten. Rational Unified Process—An Introduction. Addison-Wesley, 1998. Rational Team. “Rational Unified Process : Best Practices for Software Development Teams”. 2001. Rivest, R. “The MD5 Message-Digest Algorithm [RFC1321]”. MIT. 1994. Suhendar,A. “Teknologi Pemograman Mobile Commerce”. Penerbit Informatika, Bandung, 2002. “Keystroke logging”. Maret 2008 [Online] Available http://en.wikipedia.org/wiki/Keystroke_logging, diakses 20 Juli 2009. “Lookup table”. [Online] Available http://en.wikipedia.org/wiki/lookup_table, diakses 25 Oktober 2009. “MD5”. [Online] Available http://en.wikipedia.org/wiki/MD5, diakses 20 Juli 2009.