Minggu, 31 Juli 2016

Reason in Revolt, Vol. II

Reason in Revolt, Vol. II
By:"Ted Grant"
Published on 2007 by Algora Publishing

E-book Library:"Philosophy"

Two of Britain's deans of socialist thought consider the philosophical writings of Marx and Engels in the light of recent advances in the sciences. The authors have written a dozen books; this work is a hit in ten countries.The book reasserts the dialecti

This Book was ranked 22 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Sabtu, 30 Juli 2016

Wireless Crime and Forensic Investigation

Wireless Crime and Forensic Investigation
By:"Gregory Kipper"
Published on 2007-02-26 by CRC Press

E-book Library:"Computers"

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.

This Book was ranked 18 by Google Books for keyword ciber crime.

Thank you
E-Book University

Jumat, 29 Juli 2016

Medieval Europe and the world

Medieval Europe and the world
By:"Robin W. Winks","Teofilo F. Ruiz"
Published on 2005-02-17 by Oxford University Press, USA

E-book Library:"History"

This brief but comprehensive book illuminates the history of the Middle Ages. Beginning with the rise of Christianity in the West, and ending with the crises that shook Europe and Byzantium in the fifteenth century, the volume serves as an excellent guide to one of the most complex and creative periods the world has ever known. The narrative discusses events in Europe alongside the spread of Islam and the rise and fall of the Byzantium Empire. While the text gives ample coverage to political events, an equal emphasis is placed on social and cultural developments of the time. The authors give careful attention to such things as the daily life of peasants, the rise of urban societies, and the changing status of women. Numerous illustrations bring the history to life. With nine maps, a chronological table, and a detailed list of suggested further readings, this is the perfect text for undergraduate courses in Medieval history.

This Book was ranked 21 by Google Books for keyword bobol warnet.

Thank you
E-Book University

Manusia, teknologi, dan lingkungan

Manusia, teknologi, dan lingkungan
By:"Wiranto Arismunandar"
Published on 1992-01-01 by Penerbit Itb

E-book Library:"Education, Higher"

Speeches on higher educational activities of Bandung Institute of Technology.

This Book was ranked 36 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Kamis, 28 Juli 2016

Handbook of Consumer Finance Research

Handbook of Consumer Finance Research
By:"Jing Jian Xiao"
Published on 2008-01-03 by Springer Science & Business Media

E-book Library:"Psychology"

This handbook surveys the social aspects of consumer behavior, offering latest data and original research on current consumer needs as well as identifying emerging areas of research. This accessible volume (which can be read without advanced training in the field) starts with current concepts of risk tolerance, consumer socialization, and financial well-being, and moves on to salient data on specific settings and populations such as high school students and the older consumer.

This Book was ranked 30 by Google Books for keyword atm bangking.

Thank you
E-Book University

Managing 00 Mengatasi Krisis Komputer Tahun 2000

Managing 00 Mengatasi Krisis Komputer Tahun 2000
By:
Published on by Penerbit Andi

E-book Library:

This Book was ranked 26 by Google Books for keyword analisis komputer.

Thank you
E-Book University

Pengenalan Protokol Jaringan Wireless Komputer

Pengenalan Protokol Jaringan Wireless Komputer
By:
Published on by Penerbit Andi

E-book Library:

This Book was ranked 15 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Rabu, 27 Juli 2016

Serba-Serbi Laptop

Serba-Serbi Laptop
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 40 by Google Books for keyword jaringan komputer.

Thank you
E-Book University

Senin, 25 Juli 2016

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs
By:"Harold Abelson","Gerald Jay Sussman"
Published on 1987 by

E-book Library:

This Book was ranked 33 by Google Books for keyword belajar hacker.

Thank you
E-Book University

Meningkatkan Daya Fikir

Meningkatkan Daya Fikir
By:
Published on 2007 by PTS Professional

E-book Library:"Creative thinking"

This Book was ranked 40 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Minggu, 24 Juli 2016

Federal oversight of internet banking

Federal oversight of internet banking
By:"United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy"
Published on 2000-01-01 by

E-book Library:"Business & Economics"

This Book was ranked 32 by Google Books for keyword atm bangking.

Thank you
E-Book University

Tek.presentasi Animasi Desain Arsitek+cd

Tek.presentasi Animasi Desain Arsitek+cd
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 3 by Google Books for keyword desain iklan.

Thank you
E-Book University

Sabtu, 23 Juli 2016

Albania

Albania
By:"International Monetary Fund"
Published on 2003-06-16 by International Monetary Fund

E-book Library:"Business & Economics"

This paper examines the Progress Report for Albania’s National Strategy for Socio-Economic Development (NSSED). 2002 was the first year of implementing the NSSED. The implementation process has been oriented toward achieving the annual objectives and in accordance with the program of public priority measures for 2002–04. The experience gained in NSSED implementation, the definition and improvements to objectives and medium-term NSSED measures, the Millennium Development Goals, and Albania’s European integration objectives have all contributed to further improvements of the vision and medium and long-term NSSED objectives.

This Book was ranked 6 by Google Books for keyword ciber crime.

Thank you
E-Book University

Basis

Basis
By:
Published on 2004 by

E-book Library:"History"

This Book was ranked 27 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Jumat, 22 Juli 2016

Rethinking Money Laundering & Financing of Terrorism in International Law

Rethinking Money Laundering & Financing of Terrorism in International Law
By:"Roberto Durrieu"
Published on 2013-05-17 by Martinus Nijhoff Publishers

E-book Library:"Law"

In Rethinking Money Laundering & Financing of Terrorism in International Law: Towards a New Global Legal Order, Roberto Durrieu provides a broad and original analysis of the phenomenon of money laundering, through a thorough examination of the the financing of terrorism. The necessity of excluding the financing of terrorism from the legal definition of money laundering is clearly illustrated through extensive, original and comparative research.

This Book was ranked 13 by Google Books for keyword ciber crime.

Thank you
E-Book University

Teknologi Informasi

Teknologi Informasi
By:"Sumber: Wikipedia"
Published on 2011-09 by Books LLC, Wiki Series

E-book Library:

Sumber: Wikipedia. Halaman: 33. Bab: Layanan elektronik, WiMAX, Jaringan komputer, BIOS, Penanda sosial, Teknologi Informasi Komunikasi, Perdagangan elektronik, Sistem e-Pengadaan Pemerintah, Waring Wera Wanua, Teknologi pencari, Pertukaran data elektronik, Pembelajaran elektronik, M-dagang, Asynchronous Transfer Mode, Informatika kedokteran, Sistem informasi manajemen, XDSL, Mebibita, Informatika sipil, Pemasaran Internet, Audit teknologi informasi, Arsitektur informasi, AUI, Telecentre, Telematika, FDDI, Ekstranet, CISA, L-dagang, Migrasi proses, Least Recently Used, Base Transceiver Station, Manajemen teknologi bisnis, GPF. Kutipan: Sistem Layanan Elektronik atau E-layanan (Inggris: Electronic Services disingkat E-Services)merupakan satu aplikasi terkemuka memanfaatkan Teknologi Informasi dan Komunikasi (TIK) di daerah yang berbeda. Namun, definisi yang tepat dari layanan elektronik sulit didapat sebagian peneliti telah menggunakan definisi yang berbeda untuk menggambarkan layanan elektronik. Meskipun definisi ini berbeda, dapat dikatakan bahwa mereka semua sepakat tentang peran teknologi dalam memfasilitasi pelayanan yang membuat mereka lebih dari layanan elektronik. Menurut Rowley (2006) layanan elektronik di definisikan sebagai: ..\

This Book was ranked 30 by Google Books for keyword jaringan komputer.

Thank you
E-Book University

Kamis, 21 Juli 2016

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity
By:"Sumeet Dua","Xian Du"
Published on 2016-04-19 by CRC Press

E-book Library:"Computers"

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges—detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

This Book was ranked 27 by Google Books for keyword ciber crime.

Thank you
E-Book University

Pengembangan model desain iklan visual berwawasan jender pada media cetak

Pengembangan model desain iklan visual berwawasan jender pada media cetak
By:"Sumanto (Drs.)"
Published on 2002 by

E-book Library:

This Book was ranked 1 by Google Books for keyword desain iklan.

Thank you
E-Book University

Rabu, 20 Juli 2016

Kunci Penyelesaian Soal-soal Teori & Aplikasi Program Komputer Bahasa Basic

Kunci Penyelesaian Soal-soal Teori & Aplikasi Program Komputer Bahasa Basic
By:
Published on by Penerbit Andi

E-book Library:

This Book was ranked 16 by Google Books for keyword analisis komputer.

Thank you
E-Book University

Selasa, 19 Juli 2016

Panduan Bijak Belajar Internet untuk Anak

Panduan Bijak Belajar Internet untuk Anak
By:"Anhar"
Published on 2016-04-22 by Adamssein Media

E-book Library:

Buku yang mengupas tentang sisi keburukan internet disesuaikan dengan usia anak-anak. Buku mempunyai keunggulan bagaimana cara menangkal potensi negatif dari Internet dengan menginstall software yang bisa menghalaunya. Selain itu juga, dalam buku ini mengangkat contoh kasus sukses berkat Internet. Buku ini cocok bagi orangtua yang peduli anaknya dari pengaruh buruk Internet. Milikilah segera.

This Book was ranked 30 by Google Books for keyword belajar hacker.

Thank you
E-Book University

Riset SDM Cara praktis mendeteksi dimensi2 kerja K

Riset SDM Cara praktis mendeteksi dimensi2 kerja K
By:
Published on by Gramedia Pustaka Utama

E-book Library:

This Book was ranked 28 by Google Books for keyword analisis komputer.

Thank you
E-Book University

Analisis Unsur Terhingga Gunaan

Analisis Unsur Terhingga Gunaan
By:
Published on 1997 by Penerbit UTM

E-book Library:"Finite element method"

This Book was ranked 23 by Google Books for keyword analisis komputer.

Thank you
E-Book University

Senin, 18 Juli 2016

The Directory of Online Banking & Financial Services

The Directory of Online Banking & Financial Services
By:
Published on 2000 by

E-book Library:"Home banking services"

This Book was ranked 23 by Google Books for keyword atm bangking.

Thank you
E-Book University

Consumer banking and payments law

Consumer banking and payments law
By:"Mark E. Budnitz","Margot Freeman Saunders","National Consumer Law Center"
Published on 2002 by

E-book Library:"Business & Economics"

This Book was ranked 12 by Google Books for keyword atm bangking.

Thank you
E-Book University

Cakap kecap, 1972-2003

Cakap kecap, 1972-2003
By:
Published on 2004 by Galangpress Group

E-book Library:"Advertising"

This Book was ranked 27 by Google Books for keyword desain iklan.

Thank you
E-Book University

Laporan penelitian perancangan model sistem pendukung keputusan untuk perencanaan wilayah pesisir Bali Timur

Laporan penelitian perancangan model sistem pendukung keputusan untuk perencanaan wilayah pesisir Bali Timur
By:"I Wayan Diartika"
Published on 1998 by

E-book Library:

This Book was ranked 10 by Google Books for keyword sistem penunjang keputusan.

Thank you
E-Book University

Minggu, 17 Juli 2016

Ayo Bikin Iklan: Memahami Teori & Praktek Iklan Media Lini Bawah

Ayo Bikin Iklan: Memahami Teori & Praktek Iklan Media Lini Bawah
By:"Dendy Triadi, Addy Sukma Bharata"
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 18 by Google Books for keyword desain iklan.

Thank you
E-Book University

Mutu layanan kesehatan perpektif internasional

Mutu layanan kesehatan perpektif internasional
By:
Published on by EGC

E-book Library:

This Book was ranked 8 by Google Books for keyword sistem penunjang keputusan.

Thank you
E-Book University

iPhone vs BlackBerry

iPhone vs BlackBerry
By:"Tony Hendroyono"
Published on 2009-08-01 by Bentang Pustaka

E-book Library:"Juvenile Nonfiction"

Jangan salah! IPhone dan BlackBerry adalah dua gadget yang sedang digilai konsumen. Membelinya, berarti Anda menggenggam kecanggihan teknologi yang multifungsi. Plus, menenteng gaya hidup. Namun, jangan sampai salah pilih, meski sama-sama canggih, iPhone dan BlackBerry berbeda. Keduanya memiliki keunggulan masing-masing. Baik dari segi desain, layar, baterei, kamera, aplikasi, dukungan lokasi, keamanan, dan lainnya. Dengan bijak, buku ini akan memandu Anda mengetahui kelebihan dan kekurangan dua ponsel cerdas itu. Buku ini pun dilengkapi dengan pengetahuan-pengetahuan seputar iPhone dan BlackBerry, seperti: ? Cerita gemparnya dunia karena hadirnya iPhone di saat dunia dilanda krisis ? Cerita BlackBerry menghadapi pesaing barunya, iPhone ? Cerita rahasia di balik penemuan dan pembuatan iPhone dan BlackBerry ? Cara kerja iPhone dan BlackBerry dengan segala kesulitan dan kemudahannya, yang dilengkapi dengan gambar-gambar penjelas ? Pemaparan sistematis seputar kelebihan dan kekurangan iPhone dan BlackBerry, termasuk fitur-fitur terbaik dan bagaimana cara memaksimalkan penggunaan fitur-fitur tersebut. [Mizan, B First, Komputer, Teknologi, Indonesia]

This Book was ranked 35 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Sabtu, 16 Juli 2016

Social Engineering

Social Engineering
By:"Christopher Hadnagy"
Published on 2010-11-29 by John Wiley & Sons

E-book Library:"Computers"

The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

This Book was ranked 25 by Google Books for keyword belajar hacker.

Thank you
E-Book University

Manajemen di Indonesia

Manajemen di Indonesia
By:"Teddy Pawitra","Universitas Indonesia. Fakultas Ekonomi. Lembaga Penerbit","Ikatan Sarjana Ekonomi Indonesia"
Published on 1993 by

E-book Library:"Management"

Management development in Indonesia; collection of articles.

This Book was ranked 34 by Google Books for keyword sistem penunjang keputusan.

Thank you
E-Book University

Jumat, 15 Juli 2016

Cara Cerdas Menilai Kinerja Perusahaan Berbasis Komputer

Cara Cerdas Menilai Kinerja Perusahaan Berbasis Komputer
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 2 by Google Books for keyword analisis komputer.

Thank you
E-Book University

Kamis, 14 Juli 2016

Sistem penunjang keputusan untuk pembinaan agroindustri hortikultura sayuran

Sistem penunjang keputusan untuk pembinaan agroindustri hortikultura sayuran
By:"Juliati Rahayuningsih"
Published on 1995 by

E-book Library:"Vegetables"

Decision-making system to guide vegetable horticulture agroindustry in Java.

This Book was ranked 4 by Google Books for keyword sistem penunjang keputusan.

Thank you
E-Book University

Rabu, 13 Juli 2016

Panduan Membangun Jaringan Komputer Untuk Pemula

Panduan Membangun Jaringan Komputer Untuk Pemula
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 5 by Google Books for keyword jaringan komputer.

Thank you
E-Book University

Selasa, 12 Juli 2016

The Zone Diet

The Zone Diet
By:"Barry Sears"
Published on 1999 by HarperThorsons

E-book Library:"Health"

This is the revolutionary diet plan based on Nobel-prize winning research that has been adopted by celebrities including Madonna, Bill and Hillary Clinton, Demi Moore, Caprice Bouquet, Barry Mannilow and more. This plan is now being adapted to the British palate and cupboard. All 150 recipes in this book are anglicized.

This Book was ranked 20 by Google Books for keyword bobol warnet.

Thank you
E-Book University

Team of Rivals

Team of Rivals
By:"Doris Kearns Goodwin"
Published on 2006-09-26 by Simon and Schuster

E-book Library:"Biography & Autobiography"

An analysis of Abraham Lincoln's political talents identifies the character strengths and abilities that enabled his successful election, in an account that also describes how he used the same abilities to rally former opponents in winning the Civil War.

This Book was ranked 14 by Google Books for keyword bobol warnet.

Thank you
E-Book University

Jiwa Bahagia

Jiwa Bahagia
By:"Sigit Risat"
Published on 2015-01-01 by TransMedia

E-book Library:"Psychology"

Adalah diri yang bersemayam dalam tubuh Anda. Tak bisa terlihat, tetapi bisa dirasakan. Bisa merana, bisa pula bahagia. Ya, kebahagiaanlah yang dicari oleh manusia. Apa pun agama, profesi, jenis kelamin, atau latar belakang, Anda punya kesempatan yang sama untuk bahagia.Kebahagiaan adalah akhir sekaligus awal dari sebuah keinginan. Di satu sisi ukuran sukses adalah kebahagiaan, di sisi lain kebahagiaanlah yang membuat Anda sukses. Inilah satu kenyataan bahwa memiliki jiwa bahagia itu sangat penting karena menyangkut awal, proses, dan akhir. Oleh karena itu, buku ini mengajak Anda menemukan makna kebahagiaan yang seutuhnya. Menemukan kebahagiaan dengan tulus untuk jiwa Anda yang tengah rapuh ataupun kuat dan tegar. Menemukan kebahagiaan untuk menjalani hidup lebih sehat dan sejahtera. Kebahagiaan adalah jiwa bagi Anda. -TransMedia Pustaka- #eBookIBF

This Book was ranked 37 by Google Books for keyword belajar hacker.

Thank you
E-Book University

Senin, 11 Juli 2016

Introduction to Wireless and Mobile Systems

Introduction to Wireless and Mobile Systems
By:"Dharma Agrawal","Qing-An Zeng"
Published on 2010-06-10 by Cengage Learning

E-book Library:"Technology"

This text explains the general principles of how wireless systems work, how mobility is supported, what the underlying infrastructure is and what interactions are needed among different functional components. Designed as a textbook appropriate for undergraduate or graduate courses in Computer Science (CS), Computer Engineering (CE), and Electrical Engineering (EE), Introduction to Wireless and Mobile Systems third edition focuses on qualitative descriptions and the realistic explanations of relationships between wireless systems and performance parameters. Rather than offering a thorough history behind the development of wireless technologies or an exhaustive list of work being carried out, the authors help CS, CE, and EE students learn this exciting technology through relevant examples such as understanding how a cell phone starts working as soon as they get out of an airplane. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

This Book was ranked 10 by Google Books for keyword bobol warnet.

Thank you
E-Book University

The Crucible

The Crucible
By:"Arthur Miller"
Published on 2003-01-01 by Penguin

E-book Library:"Fiction"

A play revealing the Salem witch trials of the late seventeenth century and the problem of guilt by association.

This Book was ranked 37 by Google Books for keyword ciber crime.

Thank you
E-Book University

Hacker's Biggest Secret : Friendster Hacking

Hacker's Biggest Secret : Friendster Hacking
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 22 by Google Books for keyword belajar hacker.

Thank you
E-Book University

Minggu, 10 Juli 2016

Security Testing Handbook for Banking Applications

Security Testing Handbook for Banking Applications
By:"Arvind Doraiswamy"
Published on 2009 by IT Governance Ltd

E-book Library:"Banks and banking"

Security Testing Handbook for Banking Applications is a specialised guide to testing a wide range of banking applications. The book is intended as a companion to security professionals, software developers and QA professionals who work with banking applications.

This Book was ranked 22 by Google Books for keyword atm bangking.

Thank you
E-Book University

63 Jenis Usaha Bisnis Online Sambilan

63 Jenis Usaha Bisnis Online Sambilan
By:
Published on 2009 by Elex Media Komputindo

E-book Library:

This Book was ranked 4 by Google Books for keyword desain iklan.

Thank you
E-Book University

Sabtu, 09 Juli 2016

Bekerja Sebagai Desainer Grafis

Bekerja Sebagai Desainer Grafis
By:
Published on 2008-09-03 by ESENSI

E-book Library:

Seri \

This Book was ranked 10 by Google Books for keyword desain iklan.

Thank you
E-Book University

Mengonfigurasi Internet Windows XP

Mengonfigurasi Internet Windows XP
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 39 by Google Books for keyword jaringan komputer.

Thank you
E-Book University

Jumat, 08 Juli 2016

Dark Territory

Dark Territory
By:"Fred Kaplan"
Published on 2016-03-01 by Simon and Schuster

E-book Library:"Technology & Engineering"

“A consistently eye-opening history...not just a page-turner but consistently surprising.” —The New York Times “A book that grips, informs, and alarms, finely researched and lucidly related.” —John le Carré As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the \

This Book was ranked 10 by Google Books for keyword ciber crime.

Thank you
E-Book University

Seri Referensi Praktis: Konten Internet

Seri Referensi Praktis: Konten Internet
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 14 by Google Books for keyword sistem penunjang keputusan.

Thank you
E-Book University

Membuat Sendiri Robot Humanoid + CD

Membuat Sendiri Robot Humanoid + CD
By:
Published on by Elex Media Komputindo

E-book Library:

This Book was ranked 31 by Google Books for keyword interaksi komputer manusia.

Thank you
E-Book University

Kamis, 07 Juli 2016

Proceedings

Proceedings
By:"Organization of American States","Organization of American States. General Assembly. Regular Session"
Published on 2008 by

E-book Library:"America"

This Book was ranked 12 by Google Books for keyword ciber crime.

Thank you
E-Book University

Cara Jitu Pengelolaan Jaringan Windows dengan Remote Desktop dan Administration

Cara Jitu Pengelolaan Jaringan Windows dengan Remote Desktop dan Administration
By:
Published on by Penerbit Andi

E-book Library:

This Book was ranked 35 by Google Books for keyword jaringan komputer.

Thank you
E-Book University

Selasa, 05 Juli 2016

Yoga Anatomy 2nd Edition-Google Edition

Yoga Anatomy 2nd Edition-Google Edition
By:"Leslie Kaminoff","Amy Matthews"
Published on 2012 by Human Kinetics

E-book Library:"Health & Fitness"

Aimed at yoga enthusiasts and instructors, as well as a reference for fitness professionals and personal trainers, this book provides detailed anatomical illustrations of all standard yoga poses used by the majority of yoga practices.

This Book was ranked 31 by Google Books for keyword belajar hacker.

Thank you
E-Book University