IMPLEMENTASI METODE ACCESS CONTROL LIST UNTUK MEMONITORING AKSES JARINGAN MENGGUNAKAN SQUID PROXY

  • Gea A
  • Purba M
  • et al.
N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

Abstract

There is no doubt that technological advances, Many can be done easily without having to go through a long process. For example, by utilizing a network connection in various ways. Like looking to collect and get data whether it's using a LAN (Local Area Network), MAN (Metropolitan Area Network), WAN (Wide Area Network). This application mentions that every user who wants to use the Internet must register with the Administrator by using the Mac Address on the device. So, not too many devices are connected to the network so that it makes an Internet network.

Cite

CITATION STYLE

APA

Gea, A., Purba, M. J., Putra, A. A., Jamaluddin, J., & Siringoringo, R. (2022). IMPLEMENTASI METODE ACCESS CONTROL LIST UNTUK MEMONITORING AKSES JARINGAN MENGGUNAKAN SQUID PROXY. METHOMIKA Jurnal Manajemen Informatika Dan Komputerisasi Akuntansi, 6(1), 79–84. https://doi.org/10.46880/jmika.vol6no1.pp79-84

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free