Postingan

La Tahzan – Jangan Bersedih! (DR. Aidh Al-Qarni)

GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS (Third Edition)

Attacking Side With Backtrack (ASWB) Version 2

The ART of MEMORY FORENSICS: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Penetration Testing: A Hands-On Introduction to Hacking

INCIDENT RESPONSE & COMPUTER FORENSICS (Third Edition)

FILE SYSTEM FORENSIC ANALYSIS

Nework Forensics: Tracking Hackers Through Cyberspace

Forensic Science: Fundamental & Investigations

LEADERSHIP LESSON OF THE NAVY SEALS [Kepemimpinan Bisnis ala NAVY SEALS]

Drama Itu Bernama SEPAK BOLA: Gambaran Silang Sengkarut Olahraga, Politik, dan Budaya

36 Kasus Pemasaran Asli Indonesia: Bermain Dengan Persepsi

TKP Bicara oleh Aiptu Pudji Hardjanto

TIMOR TIMUR: THE UNTOLD STORY

BENNY MOERDANI: YANG BELUM TERUNGKAP

BEAT THE GIANT: Srategi Merek Indonesia Menandingi Merek Global dan Menjadi Tuan Rumah di Negeri Sendiri

DINAMIKA BARU JEJARING TEROR DI INDONESIA dan Keterkaitannya dengan Gerakan Radikalisme Transnasional

LAMPUNG BERSIMBAH DARAH: Menelusuri Kejahatan "Negara Intelijen" Dalam Peristiwa Jama'ah Warsidi

OPERATION NEPTUNE SPEAR: MENGUAK PERSEMBUNYIAN OSAMA BIN LADEN

Kasus Pembunuhan MUNIR: Kejahatan Yang Sempurna?

PERBANDINGAN AGAMA: Agama Yahudi (DOBEL)

Wong Jawa Timur Berpengaruh (Konteks Profesional dan Komunitas)

SINTONG PANJAITAN: PERJALANAN SEORANG PRAJURIT "PARA KOMANDO"

Hukuman MATI Untuk IMAM IMRAN Catatan Sebuah Proses Peradilan Oleh Emron Pangkapi 1982

Noordin M. Top: The Untold Stories

Dari BALI ke JATENG: Buku Putih Peran Polda Jawa Tengah dalam Pengungkapan Kasus Bom Bali

Sosok MOCH. SAID di Tengah Pergulatan Politik Jatim

GIDEON'S SPIES: Sejarah Rahasia Mossad [1]

DIGITAL FORENSIC: Practical Guidelines for Computer Investigation

CEH [5 of 5] Ethical Hacking and Countermeasures: Secure Network Infrastructures

CEH [4 of 5] Ethical Hacking and Countermeasures: Linux, Macintosh & Mobile Systems

CEH [3 of 5] Ethical Hacking and Countermeasures: Web Applications & Data Servers

CEH [2 of 5] Ethical Hacking & Countermeasures: Threats & Defense Mechanisms

CEH [1 of 5] Ethical Hacking and Countermeasures: Attack Phases

CHFI [5 of 5] Computer Forensics: Investigating Wireless Networks and Devices

CHFI [4 of 5] Computer Forensics: Investigating Network Intrusions & Cyber Crime

CHFI [3 of 5] Computer Forensics: Investigating Data & Image Files

CHFI [2 of 5] Computer Forensics: Investigating Hard Disks, File & Operating Systems

CHFI [1 of 5] Computer Forensics: Evidence Collection & Preservation

Handbook Jaringan Komputer

Presiden Offside, Kita Diam atau Memakzulkan

DPR Offside: Otokritik Parlemen Indonesia