Total data: 8
![](/slims/template/default/img/book.png)
Trik menjebak hacker dengan honeypot / Firrar Utdirartatmo
Utdirartatmo, Firrar;Yogyakarta : Andi , 2005
![](/slims/template/default/img/book.png)
Web hacking serangan dan pertahanannya / Stuart McClure
McClure, Stuart; Shah, Saumil; Shah, Shreeraj;Yogyakarta : Andi , 2005
![](/slims/template/default/img/book.png)
Citrix access security for IT administrators
Citrix Product Development Team.;New York, NY : McGraw-Hill , 0
![](/slims/template/default/img/book.png)
The GSEC prep guide :mastering SANS GIAC security essentials
Chapple, Mike.;Indianapolis, IN : : John Wiley , 2003
![](/slims/template/default/img/book.png)
The art of intrusion :the real stories behind the exploits of hackers, intruders, & deceivers
Mitnick, Kevin D.; Simon, William L.,;Indianapolis, IN : : Wiley , 2005
![](/slims/template/default/img/book.png)
Professional Windows desktop and server hardening
Grimes, Roger A.;Indianapolis, IN : : Wiley , 2006
![](/slims/template/default/img/book.png)
24 deadly sins of software security :programming flaws and how to fix them
Howard, Michael,; LeBlanc, David,; Viega, John.;New York : : McGraw-Hill , 2009
![](/slims/lib/minigalnano/createthumb.php?filename=images/docs/979-623-8325-14-6-kriptografi.jpg.jpg&width=100)
Kriptografi : prinsip, teknik, dan aplikasi
Hadi Subowo, Moh.;Semarang : Alinea Media Dipantara , 2023