3/05/2014

Ebook Pemograman dan Komputer Jaringan

Tags



Advanced Linux Programming

ANDROID SECUIRTY
https://www.dropbox.com/s/lsu5ah1w1njacqc/ANDROID%20SECUIRTY.epub12

EBOOK PEMROGRAMAN VISUAL DI LINUX
http://malsasa.files.wordpress.com/2013/10/pengantar-pemrograman-gui-di-linux.pdf

Pemrograman Qt
1 - Perkenalan Hard Coding:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-1-e28093-membuat-dialog-groupbox-layout-dan-tombol-dengan-menulis-kode-bukan-designer.pdf

2 - Mengenal Layout Sederhana:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-2-e28093-mendayagunakan-qgroupbox-dan-qhboxlayout-untuk-membentuk-kolom-dalam-qdialog.pdf

 3 - QFrame dan QVBoxLayout:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-3-e28093-mendayagunakan-qframe-dan-qvboxlayout-untuk-membentuk-kolom-lebih-banyak-dalam-qdialog.pdf

4 - Window Layering:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-4-e28093-qstackedlayout-dan-qcombobox-untuk-window-layering.pdf

 5 - Window Layering II:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-5-e28093-qstackedlayout-dan-qpushbutton-untuk-layering-setcurrentindex.pdf

6 - Menggunakan Kelas-Kelas Qt:
http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-6-e28093-membuat-program-gui-sederhana-menggunakan-sebanyak-mungkin-kelas-qstackedlayout-qpushbutton-qlabel-qcombobox-dan-lainnya.pdf

7 - Membuat GUI Front-End I:
 http://malsasa.files.wordpress.com/2013/09/pemrograman-qt-7-menjalankan-perintah-linux-dari-gui-c-dengan-mudah-menggunakan-system.pdf

8 -Mengenal Layout Lanjutan http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-8-qvboxlayout-qhboxlayout-qgridlayout-dan-sifat-sifatnya.pdf

9 - Membuat GUI Front-End II:
http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-9-qprocess-dan-menjalankan-perintah-linux.pdf

10 - Membuat GUI Front-End III:
http://malsasa.files.wordpress.com/2013/12/pemrograman-qt-10-qtextedit-qfile-qtextstream-qlabel-membaca-standard-output-shell-membaca-berkas-dan-membuat-berkas-txt.pdf

11 - Memainkan Audio
http://malsasa.files.wordpress.com/2013/10/pemrograman-qt-11-phonon-framework-untuk-memutar-audio-ogg-ketika-qpushbutton-diklik.pdf


=======================================


Ebook Linux:Linux Forensics:
http://www.digitalforensics.ch/nikkel05b-4page.pdf
http://www.deer-run.com/~hal/IntroToDigitalForensics.pdf
http://ncfs.org/craiger.ifip.05.FINAL.pdf

http://www.uscyberpatriot.org/CP5/CP%20V%20Documents/CP_Forensics_Challenge_Information.pdf
http://www.cms.livjm.ac.uk/pgnet2009/Proceedings/Papers/2009001.pdf
https://forensicfocus.files.wordpress.com/2012/08/generating-computer-forensic-supertimelines-under-linux-a-comprehensive-guide-for-windows-based-disk-images1.pdf
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6643000&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6642226%2F6642914%2F06643000.pdf%3Farnumber%3D6643000

LFS:
http://www.linuxfromscratch.org/lfs/downloads/7.3/LFS-BOOK-7.3.pd

fFHS:
http://www.tldp.org/LDP/Linux-Filesystem-Hierarchy/Linux-Filesystem-Hierarchy.pdf
http://www.pathname.com/fhs/pub/fhs-2.3.pdf
http://www.usna.edu/EE/ec310/Resource/Linux_File_System.PDF


Linux Driver Programming:
http://www.mulix.org/lectures/intro_to_linux_device_drivers/intro_linux_device_drivers.pdf
http://free-electrons.com/doc/books/ldd3.pdf
http://www.freescale.com/files/soft_dev_tools/doc/ref_manual/Linux%20Device%20Drivers.pdf
http://studenti.fisica.unifi.it/~carla/manuali/linux_device_driver_tutorial.pdf
http://www.plantation-productions.com/Webster/LinuxAsm/1_LDD.pdf
https://www.kernel.org/doc/ols/2002/ols2002-pages-545-555.pdf
http://mirror.isoc.org.il/pub/pub/august-penguin/ap2011/Mark%20Veltzer%20-%20Developing%20Linux%20drivers%20in%20C++.pdfInstalasi 


Gentoo:

http://ronnybull.com/assets/docs/gentoo.pdf
http://scst.sourceforge.net/Gentoo-HOWTO.pdf
http://www.uwyn.com/resources/benefits_of_gentoo.pdf
http://tech.fradkin.com/gentoo/gentoo-linux-good-bad-ugly.pdf
http://blu.org/meetings/2003/10/gentoo_presentation.pdf
http://donik.org/wiki/images/2/20/MythTV_gentoo_HOWTO.pdf


Btrfs:
http://events.linuxfoundation.org/sites/events/files/slides/LinuxCon_2013_NA_Eckermann_Filesystems_btrfs.pdf
http://www.oracle.com/us/technologies/linux/btrfs-features-1405320.pdf
http://oss.oracle.com/projects/btrfs/dist/documentation/btrfs-ukuug.pdf
http://www.netgear.com/images/BTRFS%20on%20ReadyNAS%20OS%206_9May1318-76105.pdf
www.opensfs.org/wp-content/uploads/2012/12/100-130_Doug_Fuller_LUG-btrfs.pdf
https://www.usenix.org/legacy/publications/login/2012-02/openpdfs/Bacik.pdf
http://domino.watson.ibm.com/library/CyberDig.nsf/papers/6E1C5B6A1B6EDD9885257A38006B6130/%24File/rj10501.pdf
http://people.redhat.com/lczerner/files/btrfs_lczerner.pdf

Kompilasi Kernel:

http://www.mulix.org/lectures/tau_linux_workshop/kernel_compilation.pdf
http://software.intel.com/sites/default/files/article/146679/linuxkernelbuildwhitepaper.pdf
http://llvm.org/devmtg/2012-04-12/Slides/Mark_Charlebois.pdf
http://homepage.smc.edu/morgan_david/linux/b03-kernelbuild.pdf
http://www.proware.com.tw/support/software/cdb16patch-lnx/linux-patch.pdf

Kernel Module Programming:
http://www.tldp.org/LDP/lkmpg/2.6/lkmpg.pdf
http://ibiblio.org/pub/Linux/docs/HOWTO/other-formats/pdf/Modules.pdf
http://download.gabsoftware.com/docs/SqueezeKernelCompilation.pdf
http://www.kerneltravel.net/downloads/tester_guide.pdf
http://mentorlinux.files.wordpress.com/2013/02/kernel-compilation-ml.pdf
http://twiki.di.uniroma1.it/pub/Sistemioperativi3/OnLine/LinuxKernelStructure.pdf

http://decal.ocf.berkeley.edu/2012-fall/labs/lab10.pdf
http://kernelbook.sourceforge.net/kernel-hacking.pdf
http://read.pudn.com/downloads155/sourcecode/embed/690510/Linux%20Kernel%20Hackers%27%20Guide.pdf

Kernel-Level Scheduler:

https://www.cs.columbia.edu/~smb/classes/s06-4118/l13.pdf
http://smacked.org/docs/scheduler-2.6.pdf
http://www.cs.princeton.edu/courses/archive/fall09/cos318/lectures/ThreadImplementation.pdf
https://www.cs.drexel.edu/~wmm24/cs370/resources/Scheduler.pdf

http://home.mit.bme.hu/~meszaros/edu/oprendszerek/segedlet/unix/2_folyamatok_es_utemezes/linux_utemezes.pdf
http://joshaas.net/linux/linux_cpu_scheduler.pdf
http://pc2.uni-paderborn.de/fileadmin/pc2/media/staffweb/Andre_Brinkmann/Courses/Operating_Systems/Operating_Systems_9.pdf
http://happyli.org/tongli/papers/linsched.pdfPemaketan 
http://www.debian.org/doc/manuals/packaging-tutorial/packaging-tutorial.pdf
http://www.debian.org/doc/manuals/maint-guide/maint-guide.en.pdf

http://csee.wvu.edu/~tbielawa/deb.pdf
http://www.tldp.org/HOWTO/pdf/Debian-Binary-Package-Building-HOWTO.pdf
http://foss-sthlm.haxx.se/mote1/debian-packaging-per-andersson.pdf
http://jon.oxer.com.au/sb/modules/talks/attachments/30/20060721-Google-DebianPackages.pdf
http://mirror.linux.org.au/linux.conf.au/2004/papers/34-wayne-piekarski-paper.pdf

Source: 
http://forum.pos-id.org/showthread.php?tid=132

======================================

Banyak juga ni referensi di sini: 
http://csrc.nist.gov/publications/PubsTC.html

Penetration Testing Sample Report:

List Kali Linux tools:
https://dl.dropboxusercontent.com/u/77838630/KaliToolslistAug2013.pdf

===================================================



#update-update



















































































































====================================================

CEH v8

EC-Council Certified Ethical Hacker CEH v8 Tools DVD ISO 6DVDs | 23.6GB: 

http://thepiratebay.sx/torrent/8625280/

http://uploaded.net/file/bmt2zwz5/EC-Council.CEHv8.Courseware.Tools.part01.rar

http://uploaded.net/file/303x5nus/EC-Council.CEHv8.Courseware.Tools.part02.rar

http://uploaded.net/file/rnwkauvo/EC-Council.CEHv8.Courseware.Tools.part03.rar

http://uploaded.net/file/lqeccibx/EC-Council.CEHv8.Courseware.Tools.part04.rar

http://uploaded.net/file/8yje7ya0/EC-Council.CEHv8.Courseware.Tools.part05.rar

http://uploaded.net/file/rbwmd6jk/EC-Council.CEHv8.Courseware.Tools.part06.rar

http://uploaded.net/file/j75cfumo/EC-Council.CEHv8.Courseware.Tools.part07.rar

http://uploaded.net/file/sqfylmaf/EC-Council.CEHv8.Courseware.Tools.part08.rar

http://uploaded.net/file/uxcpkom1/EC-Council.CEHv8.Courseware.Tools.part10.rar

http://uploaded.net/file/1sqh6w22/EC-Council.CEHv8.Courseware.Tools.part11.rar

http://uploaded.net/file/4leb6zo9/EC-Council.CEHv8.Courseware.Tools.part12.rar

http://uploaded.net/file/3395ubzc/EC-Council.CEHv8.Courseware.Tools.part13.rar

http://uploaded.net/file/tjire6hl/EC-Council.CEHv8.Courseware.Tools.part14.rar

http://uploaded.net/file/bc0q6xpu/EC-Council.CEHv8.Courseware.Tools.part15.rar

http://uploaded.net/file/zmf0jxpl/EC-Council.CEHv8.Courseware.Tools.part16.rar

http://uploaded.net/file/y8azhm7s/EC-Council.CEHv8.Courseware.Tools.part17.rar

http://uploaded.net/file/g41futr1/EC-Council.CEHv8.Courseware.Tools.part18.rar

http://uploaded.net/file/iodvv2le/EC-Council.CEHv8.Courseware.Tools.part19.rar

http://uploaded.net/file/wbhnptwi/EC-Council.CEHv8.Courseware.Tools.part20.rar

http://uploaded.net/file/zv1ycmqw/EC-Council.CEHv8.Courseware.Tools.part21.rar

http://uploaded.net/file/4ika153o/EC-Council.CEHv8.Courseware.Tools.part22.rar

http://uploaded.net/file/tt7n9d9n/EC-Council.CEHv8.Courseware.Tools.part23.rar

http://uploaded.net/file/m7epjau0/EC-Council.CEHv8.Courseware.Tools.part24.rar

==================================================

Linux Virtualization Tutorial;

http://uploaded.net/file/xxet678r/Linux_Virtualization.part1.rar

http://uploaded.net/file/aeps7y2z/Linux_Virtualization.part2.rar

http://uploaded.net/file/z8lhknzo/Linux_Virtualization.part3.rar

http://rapidgator.net/file/9b0f4d0189dad844be673808f2f0b6b1/Linux_Virtualization.part1.rar.html

http://rapidgator.net/file/c606ce899799636b78e464b2fdb8dc7d/Linux_Virtualization.part2.rar.html

http://rapidgator.net/file/fcc278eb5886f92fcc7569093d92ea8c/Linux_Virtualization.part3.rar.html


====================================================

Ethical Hacking CEHv7: Videos, Tools and Tutorials 2011 | 16.72 GB

http://rapidgator.net/file/cc3521991305ba3190509368a8783140/EC-Council.Ethical.Hacking.CEHv7.part01.rar.html

http://rapidgator.net/file/f1c56841898fb5c6eefb9a8eb361d89e/EC-Council.Ethical.Hacking.CEHv7.part02.rar.html

http://rapidgator.net/file/7897a0e9253ee911884f99881d0ae65c/EC-Council.Ethical.Hacking.CEHv7.part03.rar.html

http://rapidgator.net/file/c9b4923c04484737d63234f09e613c44/EC-Council.Ethical.Hacking.CEHv7.part04.rar.html

http://rapidgator.net/file/8e008a70f3f3069aeb7f93f3b8dc00a4/EC-Council.Ethical.Hacking.CEHv7.part05.rar.html

http://rapidgator.net/file/0cf86e00510d4af562bd019eb0e2c1a1/EC-Council.Ethical.Hacking.CEHv7.part06.rar.html

http://rapidgator.net/file/f4b690e4cf0d1087c9f7af541fa04707/EC-Council.Ethical.Hacking.CEHv7.part07.rar.html

http://rapidgator.net/file/3c7e6c2b0cebcfba451fc3c292f42c0a/EC-Council.Ethical.Hacking.CEHv7.part08.rar.html

http://rapidgator.net/file/5ea5b93d592ec1ab8b13169c0c67e2b1/EC-Council.Ethical.Hacking.CEHv7.part09.rar.html

http://rapidgator.net/file/bf1576c765c7b7270e512dd54f951220/EC-Council.Ethical.Hacking.CEHv7.part10.rar.html

http://rapidgator.net/file/ae2f85a0748656eaf2bff0fedba66ca8/EC-Council.Ethical.Hacking.CEHv7.part11.rar.html

http://rapidgator.net/file/321fa7d6cc76c3cde2ef66417dd88168/EC-Council.Ethical.Hacking.CEHv7.part12.rar.html

http://rapidgator.net/file/0e141794313d1ee145ccbf23a529e2d0/EC-Council.Ethical.Hacking.CEHv7.part13.rar.html

http://rapidgator.net/file/eb83d01fe82e500d147bd9e3e6b47cc7/EC-Council.Ethical.Hacking.CEHv7.part14.rar.html

http://rapidgator.net/file/869cb20f34e9b2bd17bb2974ee56ebc3/EC-Council.Ethical.Hacking.CEHv7.part15.rar.html

http://rapidgator.net/file/4adc1227a2932c0a15c73588fceb67a2/EC-Council.Ethical.Hacking.CEHv7.part16.rar.html

http://rapidgator.net/file/c3e1d1c37c5da7df5d8909e9ce1254f0/EC-Council.Ethical.Hacking.CEHv7.part17.rar.html

http://rapidgator.net/file/7ad6e17cf90e65ce7b3ed7d8ee4bccfd/EC-Council.Ethical.Hacking.CEHv7.part18.rar.html


===========================================
Instant Penetration Testing: Setting Up a Test Lab How-to


Metasploit The Penetration Testers Guide

The Basics of Hacking and Penetration Testing

 Seven Deadliest Wireless Technologies Attacks

 Seven Deadliest USB Attacks

Seven Deadliest Unified Communication Attacks

Seven Deadliest Microsoft Attacks

Seven
Deadliest Attacks Social Network


Biggest password cracking wordlist with millions of words

Access Denied: The Practice and Policy of Global Internet Filtering:

Linux Iptables:

Low Tech Hacking: Street Smarts for Security Professionals:

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing:


OWASP TOP 10 2013:

Squid: The Definitive Guide:

Network Warrior:

Computer viruses:

Wireless Networking Complete:

Network Security Hacks, 2nd Edition:

The Hacker's Underground Handbook: Learn how to hack and what it takes to crack even the most secure systems!

Computer Networks (5th Edition):

Hacking Secret Ciphers with Python

Ubuntu Hacks Tips & Tools for Exploring, Using, and Tuning Linux

Inside Cyber Warfare: Mapping the Cyber Underworld

Hacking Exposed Windows

The Art of Deception: Controlling the Human Element of Security (Penulis: Kevin Mitnick & William):








EmoticonEmoticon