SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Pembentangan Fundamental of Web Design
          TarikhPembentangan: 28/12/12 dan 4/1/12 shj
    Tajuk                                                             Ahli Kumpulan
1   Internet History (What, When, Where, Who)                         Shamim
             DARPA                                                    Suhaili
             ARPA                                                     Hisyammudin
             ARPANET                                                  Nurfariza
             Command line Interface to friendly user interface        Rashidi
             World Wide Web Consortium (W3C)
             Internet History in Malaysia
2   Protocol for using internet                                       Anuar
             IP , TCP/IP                                              Nazzila
             IP – How to ping IP                                      Fathiah
             Routing                                                  Shahida
             FTP                                                      Hayati
             HTTP
3   Client Server Model                                               Afifi
             What is CSM                                              Azella
             Client server architecture                               AmiraSyarina
             Client server protocol                                   AnisFatin
             Client server protocolvs P2P
             Example of CSM
4   Web Server                                                        Aiman
             IIS                                                      Taufiq
             PWS                                                      Syamimi
             APACHE                                                   Nabila
             HTTP Request Types                                       FathinHafizah
             System Architecture
             Example - Web server scripting
             Example - Client server scripting
5   ISP                                                               Nadia
             What is ISP                                              Aqilah
             ISP Architecture                                         Wardah
             Bandwidth                                                Nazmi
             Dial-up / ASL /DSL / Fiber optic / Ethernet / Intranet
6   Internet Security                                                 Farahwahida
        Cookies                                                       Fathihah
        Firewalls                                                     Maisarah
        Password cracking                                             Suraiya
        DNS spoofing
        Mail bombing
        Virus
        Privacy
7   Network Topology                                                  Nazrin
    (how it works, advantage and disadvantages, diagram)              Ameer
             Bus                                                      Aliff
             Star                                                     AmirulHisham
             Ring                                                     Asril
             Hybrid
             Mesh
8   Seven Security Threats to Sites      Taifiq Ali
           Malicious code                Ridzwan
           Hacking and cyber vandalism   Hamira
           Spoofing                      Izzati
           Credit card fraud             FatinIzzati
           Denial of Service Attacks
           Sniffing
           Insider Jobs

9   Ethics                               Theeba
             Ethical Principles          Vasugi
             Computer Ethics             Christin
             Netiquette                  Shalinita
             Whistle-blowing             Velaitham
             Plagiarism
             Libel
             Software Piracy


PembentanganadalahdidalamBahasaMelayu.

Silacetakkanslaidanda.

Weitere ähnliche Inhalte

Ähnlich wie Group ofdmg11

Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHPjikbal
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Hackfest Communication
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
Dr. David Movshovitz - Navajo SaaS
Dr. David Movshovitz -  Navajo SaaSDr. David Movshovitz -  Navajo SaaS
Dr. David Movshovitz - Navajo SaaSCSAIsrael
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksMedia Perspectives
 
What SOA and Web 2.0 Mean to the Network
What SOA and Web 2.0 Mean to the NetworkWhat SOA and Web 2.0 Mean to the Network
What SOA and Web 2.0 Mean to the Networkdigitallibrary
 
OWASPAPISecurity
OWASPAPISecurityOWASPAPISecurity
OWASPAPISecurityJie Liau
 
Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Faisal Reza
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 

Ähnlich wie Group ofdmg11 (11)

Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHP
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Dr. David Movshovitz - Navajo SaaS
Dr. David Movshovitz -  Navajo SaaSDr. David Movshovitz -  Navajo SaaS
Dr. David Movshovitz - Navajo SaaS
 
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & AttacksJeroen Wijdogen (Akamai) | TU - Hacks & Attacks
Jeroen Wijdogen (Akamai) | TU - Hacks & Attacks
 
What SOA and Web 2.0 Mean to the Network
What SOA and Web 2.0 Mean to the NetworkWhat SOA and Web 2.0 Mean to the Network
What SOA and Web 2.0 Mean to the Network
 
OWASPAPISecurity
OWASPAPISecurityOWASPAPISecurity
OWASPAPISecurity
 
Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 

Mehr von sephia17584 (16)

Intro toflash
Intro toflashIntro toflash
Intro toflash
 
Mmd2153 intro
Mmd2153 introMmd2153 intro
Mmd2153 intro
 
Mmd2093 2 4
Mmd2093 2 4Mmd2093 2 4
Mmd2093 2 4
 
Mmd2093
Mmd2093Mmd2093
Mmd2093
 
Latihan
LatihanLatihan
Latihan
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel
 
Quiz 2 oa
Quiz 2 oaQuiz 2 oa
Quiz 2 oa
 
Itc2093 intro
Itc2093 introItc2093 intro
Itc2093 intro
 
Quiz 3
Quiz 3Quiz 3
Quiz 3
 
Html
HtmlHtml
Html
 
Quiz 2 _ MMD2193
Quiz 2 _ MMD2193Quiz 2 _ MMD2193
Quiz 2 _ MMD2193
 
Treatment sample
Treatment sampleTreatment sample
Treatment sample
 
Rangkakerja sampel
Rangkakerja sampelRangkakerja sampel
Rangkakerja sampel
 
Ganttchart sample
Ganttchart sampleGanttchart sample
Ganttchart sample
 
Proposal sample
Proposal sampleProposal sample
Proposal sample
 
Story board
Story boardStory board
Story board
 

Group ofdmg11

  • 1. Pembentangan Fundamental of Web Design TarikhPembentangan: 28/12/12 dan 4/1/12 shj Tajuk Ahli Kumpulan 1 Internet History (What, When, Where, Who) Shamim DARPA Suhaili ARPA Hisyammudin ARPANET Nurfariza Command line Interface to friendly user interface Rashidi World Wide Web Consortium (W3C) Internet History in Malaysia 2 Protocol for using internet Anuar IP , TCP/IP Nazzila IP – How to ping IP Fathiah Routing Shahida FTP Hayati HTTP 3 Client Server Model Afifi What is CSM Azella Client server architecture AmiraSyarina Client server protocol AnisFatin Client server protocolvs P2P Example of CSM 4 Web Server Aiman IIS Taufiq PWS Syamimi APACHE Nabila HTTP Request Types FathinHafizah System Architecture Example - Web server scripting Example - Client server scripting 5 ISP Nadia What is ISP Aqilah ISP Architecture Wardah Bandwidth Nazmi Dial-up / ASL /DSL / Fiber optic / Ethernet / Intranet 6 Internet Security Farahwahida Cookies Fathihah Firewalls Maisarah Password cracking Suraiya DNS spoofing Mail bombing Virus Privacy 7 Network Topology Nazrin (how it works, advantage and disadvantages, diagram) Ameer Bus Aliff Star AmirulHisham Ring Asril Hybrid Mesh
  • 2. 8 Seven Security Threats to Sites Taifiq Ali Malicious code Ridzwan Hacking and cyber vandalism Hamira Spoofing Izzati Credit card fraud FatinIzzati Denial of Service Attacks Sniffing Insider Jobs 9 Ethics Theeba Ethical Principles Vasugi Computer Ethics Christin Netiquette Shalinita Whistle-blowing Velaitham Plagiarism Libel Software Piracy PembentanganadalahdidalamBahasaMelayu. Silacetakkanslaidanda.