SISTEM KEAMANAN WEB DENGAN MENGGUNAKAN KRIPTOGRAFI MESSAGE DIGEST 5/MD5 PADA KOPERASI MITRA SEJAHTERA BANDUNG

. Komarudin, Asep Ririh Riswaya

Abstract


A security issue for the company’s website is very important to manage carefully because the statistics of information held by the company. By using cryptography is expected to be one of the alternatives in maintaining security in this cooperative website Prosperity Partners Bandung by applying cryptographic MD5. Application that was built using Object Oriented Approach method Development Life Cycle (OODLC) as well as the approach to object-oriented software paradigm Unified Modeling Language (UML).

 

Keywords: web protection system; cryptography; system administration


Full Text:

PDF

References


REFERENSI

Baswir, Revrisond. (2000). Koperasi Indonesia, Jakarta: Tim Nasional Pengkajian Perkoperasian, Departemen Koperasi.

Borg, Walter R., & Gall, Meredith D. (1989). Educational Research. New York: Longman.

Jogiyanto, HM. 2005. Analisis dan Desain Sistem Informasi Pendekatan Terstruktur, edisi ketiga. Yogyakarta: Andi Offset.

Larman, Craig. 2004. Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development, Third Edition. New Jersey: Prentice Hall.

Nasir, Mohammad. 1988. Metode Penelitian. Jakarta: Ghalia Indonesia.

Nugroho, Adi. (2009), “Rekayasa Perangkat Lunak Menggunakan UML dan Java”, C.V Andi Offset, Yogyakarta.

Pressman, Roger S. 2010. Software Engineering: A Practitioner's Approach. New York: McGraw-Hill Science/Engineering/Math.

Schalkoff, R. 1992. Pattern Recognition: Statistical, Structural, and Neural Approach. New York: John Wiley & Sons, Inc.

Schneier, B. 1994. Applied Cryptography:Protocols. Algorithms. and Source Code in C. New York. John Wiley & Sons. Inc,.

Surono, Budi. 2011, “Analisis dan Perancangan Sistem Informasi Administrasi Sekolah pada SMA Tugu Nasional”

Widodo, Prabowo Pudjo & Heriawati (2011), “Menggunakan UML”, Informatika Bandung, Bandung.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2013 JURNAL COMPUTECH & BISNIS