Salinan Chairil Anwar Bagimu Negeri (Z-Library)
Unknown
Danur
Risa Saraswati
Salinan 1.253) Kupas Tuntas Tentang Tawassul
Salinan 1.143) Hadits-Hadits Keutamaan Al Quran
Understanding Cryptography
Ethan Scott
Cybersecurity
Duane C. Wilson
The Art of Attack: Attacker Mindset for Security Professionals
Maxie Reynolds
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Cybersecurity: A Self-Teaching Introduction
C. P. Gupta & K. K. Goyal
Tribe of Hackers: Cybersecurity Advice From the Best Hackers ...
Marcus J. Carey & Jennifer Jin
Multimedia Big Data Computing for IoT Applications: Concepts, ...
Sudeep Tanwar & Sudhanshu Tyagi & Neeraj Kumar
Hands-On IoT Solutions With Blockchain: Discover How Converging ...
Maximiliano Santos & Enio Moura
Linux Basics for Hackers: Getting Started With Networking, Scripting, ...
OccupyTheWeb
Introductory Computer Forensics: A Hands-On Practical Approach
Xiaodong Lin
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Network Security and Cryptography
Sarhan M. Musa
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Become ITIL Foundation Certified in 7 Days: Learning ITIL Made ...
Abhinav Krishna Kaiser
Linux Server Security: Hack and Defend
Chris Binnie
The Car Hacker's Handbook: A Guide for the Penetration Tester
Craig Smith
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Threat Modeling: Designing for Security
Adam Shostack
Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, ...
Bruce Dang & Alexandre Gazet & Elias Bachaalany
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Gray Hat Python: Python Programming for Hackers and Reverse ...
Linux Firewalls: Attack Detection and Response
Michael Rash