SlideShare a Scribd company logo
1 of 1
Download to read offline
DAFTAR TABEL

Tabel                                                                                    Halaman
3.1.    Rencana Penyelesaian Tugas Akhir ..................................................   III-3
4.1.    Keterangan Use Case Diagram modAuth .........................................         IV-7
4.2.    Keterangan Class Diagram modAuth ................................................ IV-13
4.3.    Keterangan Tabel User Pada Database modAuth ............................. IV-16
5.1.    Dokumentasi File Source Code modAuth .........................................        V-3
5.2.    Hasil Pengujian Terhadap Use Case Login .......................................       V-6
5.3.    Aplikasi Yang Digunakan Untuk Menguji modAuth ........................                V-9
5.4.    Hasil Pengujian Menggunakan Aplikasi Wireshark ......................... V-11
5.5.    Hasil Pengujian Menggunakan Aplikasi OverSpy ............................ V-12




                                                xv

More Related Content

Viewers also liked

Manual Bookess de Divulgação
 Manual  Bookess de Divulgação Manual  Bookess de Divulgação
Manual Bookess de DivulgaçãoBookess Editora
 
Recommendation - PlayDesign
Recommendation - PlayDesignRecommendation - PlayDesign
Recommendation - PlayDesigncraiglangdon
 
اجابة النشاط الثانى2
اجابة النشاط الثانى2اجابة النشاط الثانى2
اجابة النشاط الثانى2gigi00_1
 
Ficheiro word p slidshare
Ficheiro word p slidshareFicheiro word p slidshare
Ficheiro word p slidsharetresa45757
 
MEGA EVENTO na A SALA (CACEM) 2011
MEGA EVENTO na A SALA (CACEM) 2011 MEGA EVENTO na A SALA (CACEM) 2011
MEGA EVENTO na A SALA (CACEM) 2011 Crioulidades Cultura
 
(Prensa) recortes de prensa 24 09-2013
(Prensa) recortes de prensa 24 09-2013(Prensa) recortes de prensa 24 09-2013
(Prensa) recortes de prensa 24 09-2013Sff-cgt Cgt Málaga
 
HAPPY THANKSGIVING 2011
HAPPY THANKSGIVING 2011HAPPY THANKSGIVING 2011
HAPPY THANKSGIVING 2011Doug Graham
 
Biografia
BiografiaBiografia
BiografiayAmPii
 
Loreal Digital Day Handout
Loreal Digital Day HandoutLoreal Digital Day Handout
Loreal Digital Day HandoutTim Bruysten
 
Cafe 3.3
Cafe 3.3Cafe 3.3
Cafe 3.3illy7
 

Viewers also liked (15)

Manual Bookess de Divulgação
 Manual  Bookess de Divulgação Manual  Bookess de Divulgação
Manual Bookess de Divulgação
 
Recommendation - PlayDesign
Recommendation - PlayDesignRecommendation - PlayDesign
Recommendation - PlayDesign
 
اجابة النشاط الثانى2
اجابة النشاط الثانى2اجابة النشاط الثانى2
اجابة النشاط الثانى2
 
Se busca
Se buscaSe busca
Se busca
 
Emma hoe overleef ik
Emma hoe overleef ikEmma hoe overleef ik
Emma hoe overleef ik
 
Ficheiro word p slidshare
Ficheiro word p slidshareFicheiro word p slidshare
Ficheiro word p slidshare
 
MEGA EVENTO na A SALA (CACEM) 2011
MEGA EVENTO na A SALA (CACEM) 2011 MEGA EVENTO na A SALA (CACEM) 2011
MEGA EVENTO na A SALA (CACEM) 2011
 
YA
YAYA
YA
 
(Prensa) recortes de prensa 24 09-2013
(Prensa) recortes de prensa 24 09-2013(Prensa) recortes de prensa 24 09-2013
(Prensa) recortes de prensa 24 09-2013
 
Fuentes
FuentesFuentes
Fuentes
 
HAPPY THANKSGIVING 2011
HAPPY THANKSGIVING 2011HAPPY THANKSGIVING 2011
HAPPY THANKSGIVING 2011
 
Biografia
BiografiaBiografia
Biografia
 
Loreal Digital Day Handout
Loreal Digital Day HandoutLoreal Digital Day Handout
Loreal Digital Day Handout
 
Armée de Terre - Serapis - Simulateur
Armée de Terre - Serapis - SimulateurArmée de Terre - Serapis - Simulateur
Armée de Terre - Serapis - Simulateur
 
Cafe 3.3
Cafe 3.3Cafe 3.3
Cafe 3.3
 

More from Muhammad Affandes (20)

affTA09 - LampiranA
affTA09 - LampiranAaffTA09 - LampiranA
affTA09 - LampiranA
 
affTA05 - BAB V
affTA05 - BAB VaffTA05 - BAB V
affTA05 - BAB V
 
affTA02 - BAB II
affTA02 - BAB IIaffTA02 - BAB II
affTA02 - BAB II
 
affTA03 - BAB III
affTA03 - BAB IIIaffTA03 - BAB III
affTA03 - BAB III
 
affTA00 - 11 Daftar Gambar
affTA00 - 11 Daftar GambaraffTA00 - 11 Daftar Gambar
affTA00 - 11 Daftar Gambar
 
affTA00 - 07 Abstrak
affTA00 - 07 AbstrakaffTA00 - 07 Abstrak
affTA00 - 07 Abstrak
 
Sidang TA
Sidang TASidang TA
Sidang TA
 
affTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
affTA00 - 04 Lembar Hak Atas Kekayaan IntelektualaffTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
affTA00 - 04 Lembar Hak Atas Kekayaan Intelektual
 
affTA00 - 09 Kata Pengantar
affTA00 - 09 Kata PengantaraffTA00 - 09 Kata Pengantar
affTA00 - 09 Kata Pengantar
 
affTA11 - LampiranC
affTA11 - LampiranCaffTA11 - LampiranC
affTA11 - LampiranC
 
affTA01 - BAB I
affTA01 - BAB IaffTA01 - BAB I
affTA01 - BAB I
 
affTA06 - BAB VI
affTA06 - BAB VIaffTA06 - BAB VI
affTA06 - BAB VI
 
affTA14 - LampiranD
affTA14 - LampiranDaffTA14 - LampiranD
affTA14 - LampiranD
 
affTA00 - 10 Daftar Isi
affTA00 - 10 Daftar IsiaffTA00 - 10 Daftar Isi
affTA00 - 10 Daftar Isi
 
affTA00 - 03 Lembar Pengesahan
affTA00 - 03 Lembar PengesahanaffTA00 - 03 Lembar Pengesahan
affTA00 - 03 Lembar Pengesahan
 
affTA00 - 05 Lembar Pernyataan
affTA00 - 05 Lembar PernyataanaffTA00 - 05 Lembar Pernyataan
affTA00 - 05 Lembar Pernyataan
 
affTA00 - 14 Daftar Pustaka
affTA00 - 14 Daftar PustakaaffTA00 - 14 Daftar Pustaka
affTA00 - 14 Daftar Pustaka
 
affTA00 - 02 Lembar Persetujuan
affTA00 - 02 Lembar PersetujuanaffTA00 - 02 Lembar Persetujuan
affTA00 - 02 Lembar Persetujuan
 
affTA10 - LampiranB
affTA10 - LampiranBaffTA10 - LampiranB
affTA10 - LampiranB
 
affTA00 - Cover dan Daftar
affTA00 - Cover dan DaftaraffTA00 - Cover dan Daftar
affTA00 - Cover dan Daftar
 

affTA00 - 12 Daftar Tabel

  • 1. DAFTAR TABEL Tabel Halaman 3.1. Rencana Penyelesaian Tugas Akhir .................................................. III-3 4.1. Keterangan Use Case Diagram modAuth ......................................... IV-7 4.2. Keterangan Class Diagram modAuth ................................................ IV-13 4.3. Keterangan Tabel User Pada Database modAuth ............................. IV-16 5.1. Dokumentasi File Source Code modAuth ......................................... V-3 5.2. Hasil Pengujian Terhadap Use Case Login ....................................... V-6 5.3. Aplikasi Yang Digunakan Untuk Menguji modAuth ........................ V-9 5.4. Hasil Pengujian Menggunakan Aplikasi Wireshark ......................... V-11 5.5. Hasil Pengujian Menggunakan Aplikasi OverSpy ............................ V-12 xv