Student Information System
RPS: Session, Learning Material, Reference, Assessment/Rubric
Info
Search Subject
Subject Name :
Landscape
Kode Matakuliah
Nama Matakuliah
sks
Creator
Reviewer
Action
Kurikulum Sistem Informasi 2023/2024
ISC6301
Keamanan Komputasi
3.00
2615 Is Mardianto, M.Kom.
3716 Ir. Adrian Sjamsul Qamar, M.T.I.
RPS
|
Assessment Map
Matakuliah tidak ditemukan
RPS Detail
Matakuliah
Profile
History
Kode Matakuliah
ISC6301
Nama Matakuliah
Keamanan Komputasi
sks
3.00
Semester Name
Subject Code
Subject Name
Group Name
Group Code
Portofolio
Genap 2023/2024 (R)
ISC6301
Keamanan Komputasi
SI-01
01
Portofolio
Review History
RPS Review History
No
Review
Review By
Review Date
1
Adrian Sjamsul Qamar
2024-11-08 18:41:13
2
Sesuai dengan nama mata kuliah "Computing Security" dan mata kuliah ini untuk program studi "Sistem Informasi" seharusnya tidak fokus pada teknik kriptografi saja tetapi mencakup keamanan sistem komputer secara luas. Jadi harus dibedakan secara signifikan dengan mata kuliah "Keamanan Informasi" pada program studi "Informatika". Usulan agar bahan kajian diubah menjadi cakupan lebih luas, misalnya: Sesi 1: Dasar-dasar Keamanan Komputer Sesi 2: Ancaman dan Kerentanan dalam Sistem Komputer Sesi 3: Kriptografi Dasar Sesi 4: Keamanan Jaringan Sesi 5: Auntentikasi dan Kontrol Akses Sesi 6: Keamanan Aplikasi dan Sistem Operasi Sesi 7: Enkripsi Data dan Sertifikat Dijital Sesi 8: Keamanan di Cloud Computing Sesi 9: Manajemen Insiden Keamanan Sesi 10: Kebijakan Keamanan dan Kepatuhan Hukum Sesi 11: Teknik Pengujian Keamanan Sesi 12: Dasar Analisis Forensik Komputer Sesi 13: Keamanan IoT Sesi 14: Tren Masa Depan dalam Keamanan Komputer
Adrian Sjamsul Qamar
2024-11-08 18:49:35
Capaian Pembelajaran (CP) terkait
Capaian Pembelajaran (CP)
KETRAMPILAN KHUSUS
3
Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
No
Detail
Course Learning Outcomes
Action
1
Show/Hide
Mahasiswa mampu menjelaskan konsep teori keamanan komputasi
Students are able to explain the concept of computing security theory
(2,2)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menjelaskan jenis serangan, layanan dan mekanisme keamanan komputasi
Students are able to explain types of attacks, services and computing security mechanisms
(2,2)
2
Show/Hide
Mahasiswa mampu menjelaskan dampak dan penerapan teknologi kriptografi
Students are able to explain the impact and application of cryptographic technology
(2,3)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menjelaskan implementasi manajemen kunci publik, digital certificate dan certificate authorities
Students are able to explain the implementation of public key management, digital certificates and certificate authorities
(2,1)
2
Mahasiswa mampu menjelaskan implementasi kriptografi pada teknologi Blockchain
Students are able to explain the implementation of cryptography on Blockchain technology
(2,2)
3
Mahasiswa mampu menjelaskan teknik otentikasi pesan
Students are able to explain message authentication techniques
(2,2)
3
Show/Hide
Mahasiswa mampu menghitung teknik multi enkripsi, mode operasi dan stream cipher
Students are able to calculate multiple encryption techniques, operating modes and stream ciphers
(3,3)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menghitung kriptografi menggunakan algoritme 3DES, RC4 dan mode operasi ECB, CBC, CFB, OFB dan CTR
Students are able to calculate cryptography using the 3DES, RC4 algorithms and ECB, CBC, CFB, OFB and CTR operating modes
(3,3)
4
Show/Hide
Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
(3,3)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menghitung kriptografi menggunakan teknik substitusi
Students are able to calculate cryptography using substitution techniques
(3,3)
2
Mahasiswa mampu menghitung kriptografi menggunakan teknik transposisi
Students are able to calculate cryptography using transposition techniques
(3,3)
3
Mahasiswa mampu memahami block cipher dan mampu menghitung kriptografi menggunakan algoritme Data Encryption Standard (DES)
Students are able to understand block ciphers and are able to calculate cryptography using the Data Encryption Standard (DES) algorithm
(3,3)
4
Mahasiswa mampu menghitung kriptografi menggunakan algoritme Advanced Encryption Standard (AES)
Students are able to calculate cryptography using the Advanced Encryption Standard (AES) algorithm
(3,3)
5
Show/Hide
Mahasiswa mampu menghitung kriptografi menggunakan algoritme kunci publik
Students are able to calculate cryptography using a public key algorithm
(3,3)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menghitung kriptografi menggunakan algoritme RSA
Students are able to calculate cryptography using the RSA algorithm
(3,3)
2
Mahasiswa mampu menghitung kriptografi menggunakan algoritme Elliptic Curve Cryptography (ECC)
Students are able to calculate cryptography using the Elliptic Curve Cryptography (ECC) algorithm
(3,3)
6
Show/Hide
Mahasiswa mampu menghitung kriptografi menggunakan algoritme Hash
Students are able to calculate cryptography using the Hash algorithm
(3,3)
No
Session Learning Outcomes - Description (Cognitive Level,Knowledge Level)
Action
1
Mahasiswa mampu menghitung kriptografi menggunakan algoritme MD5
Students are able to calculate cryptography using the MD5 algorithm
(3,3)
RPS per Session
Sesi Ke
KAD
Bahan Kajian
Metoda Pembelajaran
Waktu Belajar (Menit)
Pengalaman Belajar Mahasiswa
Referensi
Kriteria Penilaian (Indikator)
1
Pendahuluan
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menjelaskan konsep teori keamanan komputasi
Students are able to explain the concept of computing security theory
KAD
: Mahasiswa mampu menjelaskan jenis serangan, layanan dan mekanisme keamanan komputasi
Students are able to explain types of attacks, services and computing security mechanisms
(2,2)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Jenis serangan, layanan dan mekanisme keamanan informasi dapat dijelaskan
Types of attacks, services and information security mechanisms can be explained
Tugas 5.00 %
2
Enkripsi Klasik (Substitusi)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Tengah Semester - 7.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan teknik substitusi
Students are able to calculate cryptography using substitution techniques
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan teknik substitusi dapat dihitung
Cryptography using substitution techniques can be calculated
Ujian Tengah Semester 7.00 %
3
Enkripsi Klasik (Transposisi, Rotor Machine, Steganography)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Tengah Semester - 7.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan teknik transposisi
Students are able to calculate cryptography using transposition techniques
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan teknik transposisi dapat dihitung
Cryptography uses transposition techniques can be calculated
Ujian Tengah Semester 7.00 %
4
Kriptografi Simetrik DES (Pembuatan Kunci)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu memahami block cipher dan mampu menghitung kriptografi menggunakan algoritme Data Encryption Standard (DES)
Students are able to understand block ciphers and are able to calculate cryptography using the Data Encryption Standard (DES) algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme Data Encryption Standard (DES) dapat dihitung
Cryptography using the Data Encryption Standard (DES) algorithm can be calculated
Tugas 5.00 %
5
Kriptografi Simetrik DES (Proses Enkripsi)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Tengah Semester - 10.50 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu memahami block cipher dan mampu menghitung kriptografi menggunakan algoritme Data Encryption Standard (DES)
Students are able to understand block ciphers and are able to calculate cryptography using the Data Encryption Standard (DES) algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme Data Encryption Standard (DES) dapat dihitung
Cryptography using the Data Encryption Standard (DES) algorithm can be calculated
Ujian Tengah Semester 10.50 %
6
Kriptografi Simetrik AES (Pembuatan Kunci)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme Advanced Encryption Standard (AES)
Students are able to calculate cryptography using the Advanced Encryption Standard (AES) algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme Advanced Encryption Standard (AES) dapat dihitung
Cryptography using the Advanced Encryption Standard (AES) algorithm can be calculated
Tugas 5.00 %
7
Kriptografi Simetrik AES (Proses Enkripsi)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Tengah Semester - 10.50 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme simetrik
Students are able to calculate cryptography using a symmetric algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme Advanced Encryption Standard (AES)
Students are able to calculate cryptography using the Advanced Encryption Standard (AES) algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme Advanced Encryption Standard (AES) dapat dihitung
Cryptography using the Advanced Encryption Standard (AES) algorithm can be calculated
Ujian Tengah Semester 10.50 %
8
Mode Operasi dan Enkripsi Simetrik lainnya
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung teknik multi enkripsi, mode operasi dan stream cipher
Students are able to calculate multiple encryption techniques, operating modes and stream ciphers
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme 3DES, RC4 dan mode operasi ECB, CBC, CFB, OFB dan CTR
Students are able to calculate cryptography using the 3DES, RC4 algorithms and ECB, CBC, CFB, OFB and CTR operating modes
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme 3DES, RC4 dan mode operasi dapat dihitung
Cryptography uses 3DES algorithm, RC4 and operating mode can be calculated
Tugas 5.00 %
9
Kriptografi Kunci Publik (RSA)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Akhir Semester - 8.75 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme kunci publik
Students are able to calculate cryptography using a public key algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme RSA
Students are able to calculate cryptography using the RSA algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme RSA dapat dihitung
Cryptography using the RSA algorithm can be calculated
Ujian Akhir Semester 8.75 %
10
Manajemen Kunci Publik
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menjelaskan dampak dan penerapan teknologi kriptografi
Students are able to explain the impact and application of cryptographic technology
KAD
: Mahasiswa mampu menjelaskan implementasi manajemen kunci publik, digital certificate dan certificate authorities
Students are able to explain the implementation of public key management, digital certificates and certificate authorities
(2,2)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Manajemen kunci publik, digital certificate dan certificate authorities dapat dijelaskan
Public key management, digital certificates and certificate authorities can be explained
Tugas 5.00 %
11
Kriptografi Kunci Publik (ECC)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Akhir Semester - 8.75 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme kunci publik
Students are able to calculate cryptography using a public key algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme Elliptic Curve Cryptography (ECC)
Students are able to calculate cryptography using the Elliptic Curve Cryptography (ECC) algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme Elliptic Curve Cryptography (ECC) dapat dihitung
Cryptography using the Elliptic Curve Cryptography (ECC) algorithm can be calculated
Ujian Akhir Semester 8.75 %
12
Otentikasi Pesan
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Tugas - 5.00 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menjelaskan dampak dan penerapan teknologi kriptografi
Students are able to explain the impact and application of cryptographic technology
KAD
: Mahasiswa mampu menjelaskan teknik otentikasi pesan
Students are able to explain message authentication techniques
(2,2)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Teknik otentikasi pesan dapat dijelaskan
Message authentication techniques can be explained
Tugas 5.00 %
13
Algoritme Hash (MD5)
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
William Stallings(2005)
Ujian Akhir Semester - 8.75 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme Hash
Students are able to calculate cryptography using the Hash algorithm
KAD
: Mahasiswa mampu menghitung kriptografi menggunakan algoritme MD5
Students are able to calculate cryptography using the MD5 algorithm
(3,3)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Kriptografi menggunakan algoritme MD5 dapat dihitung
Cryptography using the MD5 algorithm can be calculated
Ujian Akhir Semester 8.75 %
14
Blockchain
Tutorial
150.00
Mahasiswa mendengarkan paparan dosen
Ujian Akhir Semester - 8.75 %
CAPAIAN PEMBELAJARAN
: Mampu membuat perencanaan infrastruktur TI, arsitektur jaringan, layanan fisik dan cloud, menganalisa konsep identifikasi, otentikasi, otorisasi akses dalam konteks melindungi orang dan perangkat. (CPL04 (KK.c))
Able to plan IT infrastructure, network architecture, physical and cloud services, and analyze the concepts of identification, authentication, and access authorization in the context of protecting individuals and devices. (CPL04 (KK.c))
CPMK
: Mahasiswa mampu menjelaskan dampak dan penerapan teknologi kriptografi
Students are able to explain the impact and application of cryptographic technology
KAD
: Mahasiswa mampu menjelaskan implementasi kriptografi pada teknologi Blockchain
Students are able to explain the implementation of cryptography on Blockchain technology
(2,2)
Daftar Kriteria Penilaian (Indikator)
PI Description
PI Assessment Methods
Teknik blockchain dapat dijelaskan
Blockchain techniques can be explained
Ujian Akhir Semester 8.75 %
Assessment Component
Assessment Detail
No
Component Name
Weightage
1
Tugas
30
2
Ujian Akhir Semester
35
3
Ujian Tengah Semester
35
Total
100
Daftar Referensi
1. William Stallings. Cryptography and Network Security Principles and Practices, Fourth Edition. Prentice Hall. 2005
Notice
: Trying to get property of non-object in
/var/www/html/sis/application/controllers/IndexController.php
on line
978