Microsoft Word - Memaknai Teks dari Beragam Sudut Pandang.docx
Fase B
Salinan Chelonia (Dunia Di Luar Tempurung)
Pipit
Jack Ma Alibaba (Yan Qicheng) (Z-Library)
Unknown
User Stories In Detail
Linux Firewalls: Attack Detection and Response
Michael Rash
Gray Hat Python: Python Programming for Hackers and Reverse ...
Justin Seitz
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, ...
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Threat Modeling: Designing for Security
Adam Shostack
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Black Hat Python: Python Programming for Hackers and Pentesters
The Car Hacker's Handbook: A Guide for the Penetration Tester
Craig Smith
Linux Server Security: Hack and Defend
Chris Binnie
Become ITIL Foundation Certified in 7 Days: Learning ITIL Made ...
Abhinav Krishna Kaiser
Cracking Codes With Python: An Introduction to Building and ...
Al Sweigart
Network Security and Cryptography
Sarhan M. Musa
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Introductory Computer Forensics: A Hands-On Practical Approach
Xiaodong Lin
Linux Basics for Hackers: Getting Started With Networking, Scripting, ...
OccupyTheWeb
Hands-On IoT Solutions With Blockchain: Discover How Converging ...
Maximiliano Santos & Enio Moura
Multimedia Big Data Computing for IoT Applications: Concepts, ...
Sudeep Tanwar & Sudhanshu Tyagi & Neeraj Kumar
Tribe of Hackers: Cybersecurity Advice From the Best Hackers ...
Marcus J. Carey & Jennifer Jin
Cybersecurity: A Self-Teaching Introduction
C. P. Gupta & K. K. Goyal
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
The Art of Attack: Attacker Mindset for Security Professionals
Maxie Reynolds
Cybersecurity
Duane C. Wilson
Understanding Cryptography
Ethan Scott