Tampilkan postingan dengan label E-Book's. Tampilkan semua postingan
Tampilkan postingan dengan label E-Book's. Tampilkan semua postingan

Jumat, 29 Juni 2012

The Blogger’s Guide to Online Marketing



The Blogger’s Guide to Online Marketing
English | ISBN: N/A | 2011 | 136 pages | PDF (+ various xls, doc, ppt) | 3,7 MB


Discover How to Turn Your Passion into Profit Today
Turning your passion, your blog, into something truly profitable can be quite a challenge. You’re following all the marketing advice you can find online, implementing ‘proven’ promotional tactics. You’re scrambling for the latest books, ebooks, courses, consulting…

Forget the scattergun approach.

Transform Your Blog into a Real Business
The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is a comprehensive, 31 chapter blueprint for your blog’s ongoing profitability – right from the ground up.

Backed by an extensive library of practical templates, printable worksheets, and in-practice example documents, this kit delivers all you need to make your blog turn a profit now, and over the long term.

Who’s This Kit For?
The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is designed for bloggers who want to get more out of their blogs.

More readers, more advertisers, and more profits.

You may be:
just starting to think about monetizing your blog
seeking to leverage your blog’s audience to boost revenue
eager to try new marketing techniques, but unsure where to start
hoping to create an income that sustains your blog—and your lifestyle

If you’re the kind of blogger who wants to build their blog to its full potential, The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is the guide you’ve been waiting for.

DPWMThe Blogger’s Guide to Online Marketing
English | ISBN: N/A | 2011 | 136 pages | PDF (+ various xls, doc, ppt) | 3,7 MB


Discover How to Turn Your Passion into Profit Today
Turning your passion, your blog, into something truly profitable can be quite a challenge. You’re following all the marketing advice you can find online, implementing ‘proven’ promotional tactics. You’re scrambling for the latest books, ebooks, courses, consulting…

Forget the scattergun approach.

Transform Your Blog into a Real Business
The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is a comprehensive, 31 chapter blueprint for your blog’s ongoing profitability – right from the ground up.

Backed by an extensive library of practical templates, printable worksheets, and in-practice example documents, this kit delivers all you need to make your blog turn a profit now, and over the long term.

Who’s This Kit For?
The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is designed for bloggers who want to get more out of their blogs.

More readers, more advertisers, and more profits.

You may be:
just starting to think about monetizing your blog
seeking to leverage your blog’s audience to boost revenue
eager to try new marketing techniques, but unsure where to start
hoping to create an income that sustains your blog—and your lifestyle

If you’re the kind of blogger who wants to build their blog to its full potential, The Blogger’s Guide to Online Marketing—31 Steps to a Profitable Blog is the guide you’ve been waiting for.

Minggu, 22 April 2012

Ebook Tutorial Photosop CS3 Bahasa Indonesia


Bagi Anda yang ingin belajar teknik-teknik yang terdapat pada Photoshop CS3, mungkin ebook ini bisa menjadi panduan yang pas untuk membantu Anda.

Monggo di download Ebook versi bahasa Indonesianya.

Download :
Ebook Teknik Profesional Photoshop CS3 Bahasa Indonesia

Rabu, 07 Maret 2012

The Web Application Hackers Handbook: Finding and Exploiting Security Flaws


The highly successful security book returns with a new edition, completely updated


Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You’ll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

  • Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition
  • Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more
  • Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
  • Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.


Product Details

  • Hardcover: 912 pages
  • Publisher: Wiley; 2 edition (September 27, 2011)
  • Language: English
  • ISBN-10: 1118026470
  • ISBN-13: 978-1118026472
  • Product Dimensions: 9.2 x 7.4 x 2 inches

Download :

CCNP Security Firewall 642-617 Official Cert Guide


CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

CCNP Security FIREWALL 642-617 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Download :
CCNP Security Firewall 642-617 Official Cert Guide 

Virus of the Mind


Virus of the Mind: 
"The Revolutionary New Science of the Meme and How It Can Help You"


Description:
-------------
We are surrounded by information in the 21st Century: we are bombarded by advertising, attitudes, celebrities, news, wars, fashion, the latest fads…the sheer amount of information we have access to appears untameable, unworkable, and too much to gain sense from unless we pick and choose very carefully. However, our choices are very often made for us as the result of advertising, media companies, the government and popular culture.

The results of these choices are called memes, and their impact is shaping not just society but us individually, and on a core level, beyond psychology, personal free will, and even genetics. The very first book on the subject of memes, and how they behave just like viruses, this is an incredible study into the power of communication and ‘going along with everyone else’. “Virus of the Mind” explains just how we are ‘infected’ by the deliberate shaping of society’s attitudes and behaviours – and how we can cure ourselves.

Product Details :
==========
Paperback: 272 pages
Publisher: Hay House Publishers (June 4, 2009)
Language: English
ISBN-10: 1848501277
ISBN-13: 978-1848501270

Download :
Virus of the Mind

The Power of Habit: Why We Do What We Do in Life and Business



Description :
=======
In The Power of Habit, award-winning New York Times business reporter Charles Duhigg takes us to the thrilling edge of scientific discoveries that explain why habits exist and how they can be changed. With penetrating intelligence and an ability to distill vast amounts of information into engrossing narratives, Duhigg brings to life a whole new understanding of human nature and its potential for transformation.

Along the way we learn why some people and companies struggle to change, despite years of trying, while others seem to remake themselves overnight. We visit laboratories where neuroscientists explore how habits work and where, exactly, they reside in our brains. We discover how the right habits were crucial to the success of Olympic swimmer Michael Phelps, Starbucks CEO Howard Schultz, and civil-rights hero Martin Luther King, Jr. We go inside Procter & Gamble, Target superstores, Rick Warren’s Saddleback Church, NFL locker rooms, and the nation’s largest hospitals and see how implementing so-called keystone habits can earn billions and mean the difference between failure and success, life and death.

At its core, The Power of Habit contains an exhilarating argument: The key to exercising regularly, losing weight, raising exceptional children, becoming more productive, building revolutionary companies and social movements, and achieving success is understanding how habits work.

Product Details:
==========
Hardcover: 400 pages
Publisher: Random House (February 28, 2012)
Language: English
ISBN-10: 1400069289
ISBN-13: 978-1400069286

Download :

Implementing SSH: Strategies for Optimizing the Secure Shell



Desc :
Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system’s defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients.

With the help of numerous architectural examples and case studies, you’ll gain the necessary skills to:
* Explore many remote access solutions, including the theory, setup, and configuration of port forwarding
* Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding
* Use SSH on network devices that are traditionally managed by Telnet
* Utilize SSH as a VPN solution in both a server and client aspect
* Replace insecure protocols such as Rsh, Rlogin, and FTP
* Use SSH to secure Web browsing and as a secure wireless (802.11) solution

Product Details:
===========
Paperback: 402 pages
Publisher: Wiley; 1 edition (October 31, 2003)
Language: English
ISBN-10: 0471458805
ISBN-13: 978-0471458807

Download : 
Implementing SSH: Strategies for Optimizing the Secure Shell

Hackers: Heroes of the Computer Revolution




Desc :

Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Nerraw Manijaime/Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers. Immediately following is a brief overview of the issues and ideas that are brought forward by Steven Levy's book, as well as a more detailed interpretation of each chapter of the book, mentioning some of the principal characters and events.

The book saw an edition with a new afterword (entitled "Afterword: Ten Years After") by the author in 1994. In 2010, a 25th anniversary edition with updated material was published by O'Reilly.


Download : 
Cooming Soon

Senin, 14 November 2011

Internet Denial Of Service - Attack and Defense Mechanisms



Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.

Ebook : Hacking Exposed 6 - Network Security Secrets & Solutions


"Hackers Are Not Highly Intelligent People, but Only Intelligent People Can be Good Hacker"

One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack.

This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials.

There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.

Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

Download Now

Etichal Hacking Ebook - EC-Council Exam 312-50 : Student Courseware

EC-Council E-Business Certification Series
Copyright © by EC-Council
Developer - Thomas Mathew
Publisher - OSB Publisher
ISBN No - 0972936211

By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools necessary for approaching computers with the skill and understanding of an outside hacker.

Introduction:This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.
 
External Approach
With some prior knowledge 
Without prior knowledge
Internal Approach
With some prior knowledge
With deep knowledge

Whatever the approach adopted, it is a fact that penetration testing is constrained by time and availability of resources, which varies from client to client. To effectively utilize both these telling factors, penetration testers adopt some form of structure or methodology. These can be checklists developed by consulting practices, widely available resources such as Open Source Security Testing Methodology or a customized attack strategy.

There are is no single set of methodology that can be adopted across client organizations. The skeletal frame of testing however is more or less similar. The terms of reference used for various phases may differ, but the essence is the same. As discussed in preceding modules, the test begins with:

Footprinting / Information Gathering phase
Discovery and Planning / Information Analysis phase
Detecting a vulnerability / security loophole
Attack / Penetration / Compromise
Analysis of security posture / Cover up / Report
Clean up

The general objective of a penetration test is to reveal where security fails. The result of a penetration test can be:
successful attack - when the objective is met within the scope of the attack
a partial success - when there has been a compromise, but not enough to achieve the objective
a failure - when the systems have been found to be robust to the attack methodology adopted

Foot printing / Information Gathering phase:
Client site intelligence
Infrastructure fingerprinting
Network discovery and Access point discovery

Discovery and Planning / Information Analysis phase:
Target Identification
Resource and Effort Estimation
Modeling the Attack strategy (s)
Relationship Analysis

Detecting a vulnerability / security loophole:
Vulnerability Analysis
Scanning
Enumeration
Zeroing the target

Attack / Penetration / Compromise
Exploring viable exploits (new / created / present)
Executing the attack / Alternate attack strategy
Target penetration
Escalating the attack

Analysis of security posture / Cover up / Report
Consolidation of attack information
Analysis and recommendations
Presentation and deliverables

Clean up
Clean up tasks and procedures
Restoring security posture

Download :
EC-Council Exam 312-50 : Student Courseware

Ebook : XSS Attack - Cross Site Scripting Exploits and Defense


PUBLISHED BY- Syngress Publishing, Inc. ISBN-10: 1-59749-154-3
ISBN-13: 978-1-59749-154-9

This book is all about XSS. It will cover these topics on XSS.

Cross-site Scripting Fundamentals.
The XSS Discovery Toolkit
XSS Theory
XSS Attack Methods
Advanced XSS Attack Vectors
XSS Exploited
Exploit Frameworks
XSS Worms
Preventing XSS Attacks

Download: Ebook XSS Attack

Sabtu, 25 Juni 2011

The Little Black Book of Computer Virus

The Little Black Book of Computer Viruses
The Basic Technology

 This book is a classic exposition on the programming of computer viruses. Although a bit outdated, it is free to download from the publisher's website : 
http://www.ameaglepubs.com/free_virus.html (it requires you to register but that is free too) along with the first edition of the Giant Black Book of Computer Viruses and lots of other information

Publisher: Amer Eagle Pubns Inc
Language: English
 
Download 

CEH v.5 Module 00 - 25

CEH (Certified Ethical Hacker), adalah sertifikat profesional dibidang keamanan komputer yang dikeluarkan oleh Council of E-Commerce Consultants (EC-Council) yang diakui secara internasional. Tujuan dari serifikasi ini adalah menciptakan orang-orang yang paham dan mengerti cara kerja serta memiliki kemampuan yang sama dengan Hacker.

Berikut, saya akan share beberapa CEH v.5 yang bisa anda download secara gratis melalui link yang akan saya sertakan di bawah.

[Image: 1_ceh.jpg]

[Image: 1_ceh2.jpg]

Download Link : HERe

Selasa, 17 Mei 2011

Hacking For Beginners - A Beginners Guide for Learning Ethical Hacking (ebook)

http://image.bayimg.com/caipiaada.jpg 

Hacking For Beginners is a reference book for beginners to learn ethical hacking for free and from basic level to clear all the fundamental concepts of ethical hacking.
The book has been prepared by Hacking Tech hackingtech.co.tv website for the users benefit.
so enjoy the book ....

File : Rar 6.7 Mb
Unpack : PDF 11.73 Mb
Total : 255 pages

Download :
Hacking For Beginners

Selasa, 03 Mei 2011

CN-ZINE9 Release - 2 Mei 2011-

 

Mengutip dari Sumbernya :
Dengan mengucap :

بسم الله الرحمن الرحيم

"Bismillahirohmanirohim"
maka CN-ZINE9 kami release pada hari ini tanggal 2 Mei 2011
Semoga bermanfaat (Amin)
 Link Download : CN-ZINE9

Nb : Untuk menghormati dan menghargai usaha Codenesia Team dalam membuat CN-ZINE9 maka saya tidak mengaktifkan direct link seperti biasanya. Untuk dapat mendownload CN-ZINE9 Release - 2 Mei 2011- Silahkan registrasi terlebih dahulu di Codenesia untuk mengaktifkan link download di browser Anda.


Credit to : Codensia.com

Jumat, 22 April 2011

Perempuan di Titik Nol (ebook)

Perempuan di Titik Nol


Deskripsi Singkat Mengenai Novel ini :

 Dari balik sel penjaranya, Firdaus -yang divonis gantung karena telah membunuh seorang germo-mengisahkan liku-liku kehidupannya. Dari sejak masa kecilnya di desa, hingga ia menjadi pelacur kelas atas di kota Kairo. Ia menyambut gembira hukuman gantung itu. Bahkan dengan tegas menolak grasi kepada Presiden yang diusulkan oleh dokter penjara. Menurut Firdaus, vonis itu justru merupakan satu-satunya jalan menuju kebebasan sejati. Ironis.

Lewat pelacur ini, kita justru bisa menguak kebobrokan masyarakat yang didominasi oleh kaum lelaki. Sebuah kritik sosial yang amat pedas!

Novel ini didasari atas kisah nyata. Ditulis oleh Nawal el-Saadawi, seorang penulis feminis dari Mesir dengan reputasi internasional.

Download Link :


Password : silek900



Selasa, 05 April 2011

Social Engineering: The Art of Human Hacking

Every one in security arena knows Kevin Mitnick – Father of Social Engineering – how he used to trick the people on the other side of phone to do any thing for him. Those were  the days when federal guys feared that if Kevin is let free then he can cause nuclear wars with his words. That is enough to show anyone the sheer power of ‘Social Engineering’ !

On those lines comes a new book ‘Social Engineering: The Art of Human Hacking’ which explains the terms, tricks and mastery behind this very art of social engineering.



Here is the core information :

  • Title: Social Engineering: The Art of Human Hacking
  • Author: Christopher Hadnagy, Paul Wilson
  • Publisher: Wiley
  • Hardcover: 408 pages
  • Price: $23 (as of this writing) I'll give u free :P
  • Release Date: December 21, 2010
  • Rating(Amazon):

Table of Contents

  1. A Look into the World of Social Engineering.
  2. Information Gathering.
  3. Elicitation.
  4. Pretexting: How to Become Anyone.
  5. Mind Tricks: Psychological Principles Used in Social Engineering.
  6. Influence: The Power of Persuasion.
  7. The Tools of the Social Engineer.
  8. Case Studies: Dissecting the Social Engineer.
  9. Prevention and Mitigation.

Book starts with introduction to Social Engineering then goes into preparation steps by gathering enough information about the target before the show. Next chapter on Eliciting & Pretexting describes how you can hijack some one else’s identity remotely. Finally it is all about the mind game and the chapter on ‘Mind Tricks’ (mine personal favorite chapter) explains how you can use human psychology to get under the skin of remote kin to get your job done.

Often people don’t give things/information directly, it takes enough persuasion in right direction to make a person to bow before you. Chapter 6 covers of all the tactics involved in persuading people. Next chapter on Tools talks about physical as well as online information gathering tools to prepare yourself. Final chapter cites various ways of identifying and preventing social engineering attacks by training the staff with the value of information and SE auditing.

Real gem of the book lies in ‘Case Studies’ which totally has 6 real life examples of social engineering including 2 from Kevin Mitnick.

Strictly speaking ‘Social Engineering’ is not every one’s cup of tea, not every one is born with such a gift like Kevin. But this book strikes the difference and makes it possible for you. All credit goes to authors for putting up such a difficult topic in an interesting and excellent way.

"To cut the long story short – This is the BEST book published so far on ‘Social Engineering’ and must get into your book-shelf if you are the one who look beyond the human face !"

Download Link : The Art of Human Hacking


-Redbastard-

Minggu, 09 Januari 2011

Certified Ethical Hacker Ebooks


[Image: ceh_logo.jpg]

Numpang berbagi sedikit
maling

DAFTAR MENU :

CEH-Classroom-Lab-Setup-v6.pdf


CEH-Classroom-Lab-Setup-v6.pdf


CEHv6 Module 00 Student Introduction.pdf


CEHv6 Module 00 Student Introduction.pdf


CEHv6 Module 01 Introduction to Ethical Hacking.pdf


CEHv6 Module 01 Introduction to Ethical Hacking.pdf


CEHv6 Module 02 Hacking Laws.pdf


CEHv6 Module 02 Hacking Laws.pdf


CEHv6 Module 03 Footprinting.pdf


CEHv6 Module 03 Footprinting.pdf


CEHv6 Module 04 Google Hacking.pdf


CEHv6 Module 04 Google Hacking.pdf


CEHv6 Module 05 Scanning.pdf


CEHv6 Module 05 Scanning.pdf


CEHv6 Module 06 Enumeration.pdf


CEHv6 Module 06 Enumeration.pdf


CEHv6 Module 07 System Hacking.pdf


CEHv6 Module 07 System Hacking.pdf


CEHv6 Module 08 Trojans and Backdoors.pdf


CEHv6 Module 08 Trojans and Backdoors.pdf


CEHv6 Module 09 Viruses and Worms.pdf


CEHv6 Module 09 Viruses and Worms.pdf


CEHv6 Module 10 Sniffers.pdf


CEHv6 Module 10 Sniffers.pdf


CEHv6 Module 11 Social Engineering.pdf


CEHv6 Module 11 Social Engineering.pdf


CEHv6 Module 12 Phishing.pdf


CEHv6 Module 12 Phishing.pdf


CEHv6 Module 13 Hacking Email Accounts.pdf


CEHv6 Module 13 Hacking Email Accounts.pdf


CEHv6 Module 14 Denial of Service.pdf


CEHv6 Module 14 Denial of Service.pdf


CEHv6 Module 15 Session Hijacking.pdf


CEHv6 Module 15 Session Hijacking.pdf


CEHv6 Module 16 Hacking Webservers.pdf


CEHv6 Module 16 Hacking Webservers.pdf


CEHv6 Module 17 Web Application Vulnerabilities.pdf


CEHv6 Module 17 Web Application Vulnerabilities.pdf


CEHv6 Module 18 Web based Password Cracking Techniques.pdf


CEHv6 Module 18 Web based Password Cracking Techniques.pdf


CEHv6 Module 19 SQL Injection.pdf


CEHv6 Module 19 SQL Injection.pdf


CEHv6 Module 20 Hacking Wireless Networks.pdf


CEHv6 Module 20 Hacking Wireless Networks.pdf


CEHv6 Module 21 Physical Security.pdf


CEHv6 Module 21 Physical Security.pdf


CEHv6 Module 22 Linux Hacking.pdf


CEHv6 Module 22 Linux Hacking.pdf


CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf


CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf


CEHv6 Module 24 Buffer Overflows.pdf


CEHv6 Module 24 Buffer Overflows.pdf


CEHv6 Module 25 Cryptography.pdf


CEHv6 Module 25 Cryptography.pdf


CEHv6 Module 26 Penetration Testing.pdf


CEHv6 Module 26 Penetration Testing.pdf


CEHv6 Module 28 Writing Virus Codes.pdf


CEHv6 Module 28 Writing Virus Codes.pdf


CEHv6 Module 29 Assembly Language Tutorial.pdf


CEHv6 Module 29 Assembly Language Tutorial.pdf


CEHv6 Module 30 Exploit Writing.pdf


CEHv6 Module 30 Exploit Writing.pdf


CEHv6 Module 31 Exploit Writing.pdf


CEHv6 Module 31 Exploit Writing.pdf


CEHv6 Module 32 Exploit Writing.pdf


CEHv6 Module 32 Exploit Writing.pdf


CEHv6 Module 33 Reverse Engineering Techniques.pdf


CEHv6 Module 33 Reverse Engineering Techniques.pdf


CEHv6 Module 34 MAC OS X Hacking.pdf


CEHv6 Module 34 MAC OS X Hacking.pdf


CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf


CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf


CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf


CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf


CEHv6 Module 37 Bluetooth Hacking.pdf


CEHv6 Module 37 Bluetooth Hacking.pdf


CEHv6 Module 38 VoIP Hacking.pdf


CEHv6 Module 38 VoIP Hacking.pdf


CEHv6 Module 39 RFID Hacking.pdf


CEHv6 Module 39 RFID Hacking.pdf


CEHv6 Module 40 Spamming.pdf


CEHv6 Module 40 Spamming.pdf


CEHv6 Module 41 Hacking USB Devices.pdf


CEHv6 Module 41 Hacking USB Devices.pdf


CEHv6 Module 42 Hacking Database Servers.pdf


CEHv6 Module 42 Hacking Database Servers.pdf


CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf


CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf


CEHv6 Module 44 Internet Content Filtering Techniques.pdf


CEHv6 Module 44 Internet Content Filtering Techniques.pdf


CEHv6 Module 45 Privacy on the Internet.pdf


CEHv6 Module 45 Privacy on the Internet.pdf


CEHv6 Module 46 Securing Laptop Computers.pdf


CEHv6 Module 46 Securing Laptop Computers.pdf


CEHv6 Module 47 Spying Technologies.pdf


CEHv6 Module 47 Spying Technologies.pdf


CEHv6 Module 48 Corporate Espionage by Insiders.pdf


CEHv6 Module 48 Corporate Espionage by Insiders.pdf


CEHv6 Module 49 Creating Security Policies.pdf


CEHv6 Module 49 Creating Security Policies.pdf


CEHv6 Module 50 Software Piracy and W.pdf


CEHv6 Module 50 Software Piracy and W.pdf


CEHv6 Module 51 Hacking and Cheating Online Games.pdf


CEHv6 Module 51 Hacking and Cheating Online Games.pdf


CEHv6 Module 52 Hacking RSS and Atom.pdf


CEHv6 Module 52 Hacking RSS and Atom.pdf


CEHv6 Module 53 Hacking Web Browsers.pdf


CEHv6 Module 53 Hacking Web Browsers.pdf


CEHv6 Module 54 Proxy Server Technologies.pdf


CEHv6 Module 54 Proxy Server Technologies.pdf


CEHv6 Module 55 Preventing Data Loss.pdf


CEHv6 Module 55 Preventing Data Loss.pdf


CEHv6 Module 56 Hacking Global Positioning System.pdf


CEHv6 Module 56 Hacking Global Positioning System.pdf


CEHv6 Module 57 Computer Forensics and Incident Handling.pdf


CEHv6 Module 57 Computer Forensics and Incident Handling.pdf


CEHv6 Module 58 Credit Card Frauds.pdf


CEHv6 Module 58 Credit Card Frauds.pdf


CEHv6 Module 59 How to Steal Passwords.pdf


CEHv6 Module 59 How to Steal Passwords.pdf


CEHv6 Module 60 Firewall Technologies.pdf


CEHv6 Module 60 Firewall Technologies.pdf


CEHv6 Module 61 Threats and Countermeasures.pdf


CEHv6 Module 61 Threats and Countermeasures.pdf


CEHv6 Module 62 Case Studies.pdf


CEHv6 Module 62 Case Studies.pdf


CEHv6 Module 63 Botnets.pdf


CEHv6 Module 63 Botnets.pdf


CEHv6 Module 64 Economic Espionage.pdf


CEHv6 Module 64 Economic Espionage.pdf


CEHv6 Module 65 Patch Management.pdf


CEHv6 Module 65 Patch Management.pdf


CEHv6 Module 66 Security Convergence.pdf


CEHv6 Module 66 Security Convergence.pdf


CEHv6 Module 67 Identifying the Terrorists.pdf


CEHv6 Module 67 Identifying the Terrorists.pdf

Link donlot : HERE

Credit to :
=> The Google Guys;
=> Yang buat Ebook;
=>Uploader;

-I'm Just Ordinary Dudul-
dead

Senin, 25 Oktober 2010

Sebab Mekarmu Hanya Sekali [Ebook Penting buat Cewek - Harus Baca

Pergaulan bebas, sebuah produk impor yang merusak ternyata telah menjadi komoditi yang cukup laris di kalangan remaja. Apalagi dalih mereka, kalau bukan kemajuan, modernisasi, kesetaraan gender dan alasan-alasan menggiurkan lainnya. Berbagai penelitian seputar pergaulan bebas dan hubungan di luar nikah dilakukan, baik oleh perorangan ataupun lembaga, dan hasilnya, sungguh sangat mengejutkan, "Hampir sebagian besar remaja telah terjerumus di dalamnya."

Untuk itu perlu dilakukan upaya penanggulangan melalui berbagai cara dan sarana. Salah satunya adalah melalui media bacaan yang dapat mengarahkan para remaja kepada pergaulan yang benar dan menjelaskan bahaya-bahaya yang ditimbulkan akibat pergaulan bebas.

Anda dapat mendownload langsung ebooknya melalui link ini
Apabila mengalami kesulitan mendownload anda dapat memanfaatkan link download alternatifnya di sini