Salinan 136) Perjalanan Aktivis Gerakan Islam
Unknown
Microsoft Word - 76_Ku Tunggu Di Pintu Neraka.doc
gino
Brand Against the Machine: How to Build Your Brand, Cut Through ...
John Michael Morgan
acceptance criteria gwt for cleveland iiba
Industrial Sensors and Controls in Communication Networks: From ...
Dong-Seong Kim & Hoa Tran-Dang
Design Research in Information Systems: Theory and Practice
Alan Hevner & Samir Chatterjee
Fundamentals of Multimedia
Ze-Nian Li & Mark S. Drew & Jiangchuan Liu
Guide to Computer Network Security
Joseph Migga Kizza
Principles of Mobile Communication
Gordon L. Stüber
Financial Modeling for Business Owners and Entrepreneurs: Developing ...
Tom Y. Sawyer
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols ...
Charles M. Kozierok
The Practice of Network Security Monitoring: Understanding Incident ...
Richard Bejtlich
Linux All-In-One for Dummies
Emmett Dulaney
Beginning Linux Programming
Neil Matthew & Richard Stones
Linux Server Security: Hack and Defend
Chris Binnie
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie & Kim Crawley
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Liars and Outliers: Enabling the Trust That Society Needs to ...
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick & William L. Simon
From Projects to Programs: A Project Manager's Journey
Samir Penkar
The Human Factor in Project Management
Denise Thompson
Cisco Networking Essentials
Troy McMillan
From Techie to Boss: Transitioning to Leadership
Scott Cromar & David M. Jacobs
Implementing Azure Solutions
Florian Klaffenbach & Jan-Henrik Damaschke & Oliver Michalski
Mastering Hyper-V 2012 R2 With System Center and Windows Azure
John Savill
Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, ...
Bruce Dang & Alexandre Gazet & Elias Bachaalany
Microsoft Windows Networking Essentials
Darril Gibson
The Web Application Hacker's Handbook: Finding and Exploiting ...
Dafydd Stuttard & Marcus Pinto
Threat Modeling: Designing for Security
Adam Shostack
Internet of Things Programming Projects - Second Edition: Build ...
Colin Dow
ESP8266 Home Automation Projects: Leverage the Power of This ...
Catalin Batrinu
Internet of Things for Architects: Architecting IoT Solutions ...
Perry Lea
Linux for Makers: Understanding the Operating System That Runs ...
Aaron Newcomb
The Self-Made Program Leader: Taking Charge in Matrix Organizations
Steve Tkalcevich
Maximizing Benefits From IT Project Management: From Requirements ...
José López Soriano
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: ...
Andrew Thu Pham
Culture Matters: Decision-Making in Global Virtual Teams
Norhayati Zakaria
Become ITIL Foundation Certified in 7 Days: Learning ITIL Made ...
Abhinav Krishna Kaiser
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD ...
Peter N. M. Hansteen
Wearable-Tech Projects With the Raspberry Pi Zero
Jon Witts