Mengenal Lebih Dekat Dengan Administrasi Jaringan Komputer BAB 5 PENERAPAN KEAMANAN WEB SERVER DAN MAIL SERVER 5 1 Web Server 5 2 Mail Server 77 78 83 BAB 6 TOOLS DAN TEKNIK KEAMANAN KOMPUTER 6 1 Pengertian Keamanan Komputer 6 2 Manfaat Keamanan Komputer 6 3 Tools Keamanan Komputer 91 92 92 93 BAB 7 TEKNOLOGI VIRTUALISASI 7 1 Apa itu Hyper V 7 2 Sejarah Hyper V 7 3 Mengapa Menggunakan Virtualisasi 7 4 ara Kerja Virtualisasi 7 5 Terminologi Hyper V 7 6 Tipe Virtualisasi 7 7 Jenis virtualisasi 101 102 102 103 105 106 108 109 BAB 8 KEAMANAN SISTEM OPERASI 123 8 1 Memahami Sistem Operasi 124 8 2 Keamanan Sistem Operasi 131 BAB 9 TOOLS DAN TEKNIK KEAMANAN KOMPUTER 9 1 Pengertian Keamanan Komputer 9 2 Manfaat Keamanan Komputer 9 3 Tools Keamanan Komputer 135 136 137 138 BAB 10 SHARING FILE DAN PRINTER SHARING 10 1 File Sharing 10 2 Aktifasi Menu File Sharing 10 3 Mematikan Menu Firewall 10 3 Sharing File 10 4 Printer Sharing 145 146 147 150 153 157 DAFTAR PUSTAKA 161 PROFIL PENULIS 163 viiMengenal Lebih Dekat Dengan Administrasi Jaringan Komputer BAB 5 PENERAPAN KEAMANAN WEB SERVER DAN MAIL SERVER................................................................................................... 5.1 Web Server .................................................................................. 5.2 Mail Server ................................................................................... 77 78 83 BAB 6 TOOLS DAN TEKNIK KEAMANAN KOMPUTER....................... 6.1 Pengertian Keamanan Komputer........................................ 6.2 Manfaat Keamanan Komputer............................................. 6.3 Tools Keamanan Komputer ................................................... 91 92 92 93 ...BAB 7 TEKNOLOGI VIRTUALISASI ............................................................. 7.1 Apa itu Hyper-V?....................................................................... 7.2 Sejarah Hyper-V ........................................................................ 7.3 Mengapa Menggunakan Virtualisasi? .............................. 7.4 ara Kerja Virtualisasi? ............................................................... 7.5 Terminologi Hyper-V ............................................................... 7.6 Tipe Virtualisasi .......................................................................... 7.7 Jenis virtualisasi ........................................................................ 101 102 102 103 105 106 108 109 BAB 8 KEAMANAN SISTEM OPERASI ...................................................... 123 8.1 Memahami Sistem Operasi ................................................... 124 8.2 Keamanan Sistem Operasi ..................................................... 131 BAB 9 TOOLS DAN TEKNIK KEAMANAN KOMPUTER....................... 9.1 Pengertian Keamanan Komputer........................................ 9.2 Manfaat Keamanan Komputer............................................. 9.3 Tools Keamanan Komputer ................................................... 135 136 137 138 BAB 10 SHARING FILE DAN PRINTER SHARING ................................... 10.1 File Sharing .................................................................................. 10.2 Aktifasi Menu File Sharing..................................................... 10.3 Mematikan Menu Firewall ..................................................... 10.3 Sharing File .................................................................................. 10.4 Printer Sharing ........................................................................... 145 146 147 150 153 157 DAFTAR PUSTAKA ............................................................................................... 161 PROFIL PENULIS .................................................................................................. 163 vii