Powered by Blogger.
  • Ebook Web Hacking Basic (Bahasa Indonesia) adalah ebook yang di tulis oleh Ahmad Muammar. Ebook ini memberikan penjelasan serta teori dasar - dasar dan juga dalam melakukan Web Hacking .Ebook ini sangat cocok bagi ingin belajar ngehack web
  • You will use Kali Linux as the attack platform throughoutthis book. Kali, thesuccessor to the popularBackTrackLinux, is a Debian-based distribution thatcomes with a plethora of penetration testingtools preinstalled and reconfigured. Anyone who’s evertried to set up a pentesting box from scratch the day


  • The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk
  • Designed for the new command line user, this 537-page volume covers the same material as LinuxCommand.org but in much greater detail. In addition to the basics of command line use and shell scripting, The Linux Command Line includes chapters on many common programs used on the command line, as well as more advanced topics.


  • Many people still believe that learning Linux is difficult, or that only experts can understand how a Linux system works. Though there is a lot of free documentation available, the documentation is widely scattered on the Web, and often confusing, since it is usually oriented toward experienced UNIX or Linux users. Today, thanks to the advancements in development, Linux has grown in popularity both at home and at work. The goal of this guide is to show people of all ages that Linux can be simple and fun, and used for all kinds of purposes.


  • Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book
  • No programming language is perfect. There is not even a single best language; there are only languages well suited or perhaps poorly suited for particular purpos
  • Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.
  • In this free ebook you’ll be introduced to the basics of the Linux operating systems. Get to know what it is all about, and familiarize yourself with the practical side. Basically, if you’re a complete Linux newbie and looking for a quick and easy guide to get you started – this is it.
  • A groundbreaking exploration of how to identify and fight security threats at every level.This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat
  • Data loss, security breaches, lost devices. Download the checklist, Lenovo Recommends 15 Steps to Reducing Security Risks In Enterprise Mobility, and get practical information to mitigate the risks that cause your worst headaches
  • For senior IT leaders who are addressing data privacy concerns in their organizations, this paper covers the key issues to consider and gives recommendations for complying with data residency laws and protecting corporate and employee data privacy.
  • Linux continues to be an excellent, low-cost alternative to expensive operating systems. Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today.
  • Unlike many other organizations, however, law firms must also protect their client’s confidential information. They have long been required to secure private information due to legal and regulatory requirements. Email is a key area of a firm’s IT infrastructure when it comes to vigilance for security and governance.
  • Pearson France a apporté le plus grand soin à la réalisation de ce livre afin de vous fournir une information complète et fiable. Cependant, Pearson France n’assume de responsabilités, ni pour son utilisation, ni pour les contrefaçons de brevets ou atteintes aux droits de tierces personnes qui pourraient résulter de cette utilisation.
  • Executive Brief Your data isn’t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated over the years. But sometimes it’s the least sophisticated method of hacking that threatens the world’s biggest industries. In recent years, hacking has evolved from single-source denial of service (DoS) attacks to Distributed Denial of Services (DDoS)
    attacks, which strike from thousands of unique IPs. These disturbances can be created cheaply and easily and can take a service offline or shut a business down completely
  • I didn’t start one day to think that I’d write a book about penetration testing, but I kind of fell into it. What happened was I started taking notes from penetration tests, conferences, security articles, research, and life experiences. As my notes grew and grew, I found better and better ways to perform repetitive tasks and I began to understand what worked and what didn’t
  • With modern tools, it is possible to create production-grade applications using only JavaScript, HTML, and CSS. The combination of MongoDB, Express, AngularJS, and Node.js, all JavaScript technologies, has become so popular that it’s been dubbed the MEAN stack. This book will explore the MEAN stack in detail........
  • Author Stefan Sjogelid grew up in the 1980s in Sweden, getting hooked on 8-bit consoles, Amigas, and BBSes. With a background in system and network administration, he packed his bags for Southeast Asia and continued to work in IT for many years, before love and a magic 8 ball told him to seek new opportunities in the North American continent


  • Hiện nay với sự phát triển của thời đại công nghệ thông tin. Nhu cầu trao đổi, chia sẽ thông tin rất là lớn. Khi internet ra đời với mục tiêu xóa bỏ khoảng cách địa lý để mọi người trên thế giới có thể đến gần bên nhau chi sẽ tài nguyên, tài liệu, thông tin v..vv.Chính vì điều đó nên việc bị tổn thất, mất mát, hư hại, lấy cắp tài liệu trở nên dễ dàng hơn. Càng giao thiệp rộng thì càng dễ bị tấn công, đó là quy luật. Cho nên việc bảo mật thông tin là hết sức cần thiết để bảo vệ tính riêng tư tránh những xâm phạm trái phép.
    Hiện nay với sự phát triển của thời đại công nghệ
    thông tin. Nhu cầu trao đổi, chia sẽ thông tin
    rất là lớn. Khi internet ra đời với mục tiêu xóa bỏ khoảng cách địa lý để mọi người trên thế giới
    có thể đến gần bên nhau chi sẽ tài nguyên, tài liệu, thông tin v..vv.
    Chính vì điều đó nên việc bị tổn thất, m
    ất mát, hư hại, lấy cắp tài liệu trở nên dễ dàng hơn.
    Càng giao thiệp rộng thì càng dễ bị tấn công, đó là quy luật. Cho nên việc bảo mật thông tin là
    hết sức cần thiết để bảo vệ tính riêng tư tránh những xâm phạm trái phép.
    Hiện nay với sự phát triển của thời đại công nghệ
    thông tin. Nhu cầu trao đổi, chia sẽ thông tin
    rất là lớn. Khi internet ra đời với mục tiêu xóa bỏ khoảng cách địa lý để mọi người trên thế giới
    có thể đến gần bên nhau chi sẽ tài nguyên, tài liệu, thông tin v..vv.
    Chính vì điều đó nên việc bị tổn thất, m
    ất mát, hư hại, lấy cắp tài liệu trở nên dễ dàng hơn.
    Càng giao thiệp rộng thì càng dễ bị tấn công, đó là quy luật. Cho nên việc bảo mật thông tin là
    hết sức cần thiết để bảo vệ tính riêng tư tránh những xâm phạm trái phép.
    Hiện nay với sự phát triển của thời đại công nghệ
    thông tin. Nhu cầu trao đổi, chia sẽ thông tin
    rất là lớn. Khi internet ra đời với mục tiêu xóa bỏ khoảng cách địa lý để mọi người trên thế giới
    có thể đến gần bên nhau chi sẽ tài nguyên, tài liệu, thông tin v..vv.
    Chính vì điều đó nên việc bị tổn thất, m
    ất mát, hư hại, lấy cắp tài liệu trở nên dễ dàng hơn.
    Càng giao thiệp rộng thì càng dễ bị tấn công, đó là quy luật. Cho nên việc bảo mật thông tin là
    hết sức cần thiết để bảo vệ tính riêng tư tránh những xâm phạm trái phép.