You are on page 1of 1

DAFTAR PUSTAKA

Dhar, Summit. “Sniffers – Basic and Detection”. Reliance Infocomm. 2002.


Ivar Jacobson, Grady Booch, and Jim Rumbaugh. “Unified Software Development
Process”. Addison-Wesley, 2002.
Klevinsky, T.J dan Scott Laliberte. “Hack I.T. – Security Through Penetration
Testing”. Addison-Wesley. 2002.
M. Farid Azis. “Belajar Sendiri Pemrograman PHP 4 Bagi Web Programmer”.
PT Elex Media Komputindo, Jakarta, 2001.
Philippe Kruchten. A Rational Development Process, “CrossTalk”, vol 9 (7),
STSC, Hill AFB, UT, hal.11-16.
Philippe Kruchten. Rational Unified Process—An Introduction. Addison-Wesley,
1998.
Rational Team. “Rational Unified Process : Best Practices for Software
Development Teams”. 2001.
Rivest, R. “The MD5 Message-Digest Algorithm [RFC1321]”. MIT. 1994.
Suhendar,A. “Teknologi Pemograman Mobile Commerce”. Penerbit Informatika,
Bandung, 2002.
“Keystroke logging”. Maret 2008 [Online] Available
http://en.wikipedia.org/wiki/Keystroke_logging, diakses 20 Juli 2009.
“Lookup table”. [Online] Available http://en.wikipedia.org/wiki/lookup_table,
diakses 25 Oktober 2009.
“MD5”. [Online] Available http://en.wikipedia.org/wiki/MD5, diakses 20 Juli
2009.

You might also like