Stallings, William, author
Data and communications
Prentice-Hall, 1994
 Buku Teks
Johnson, Rob, author
Security policies and implementation issues
Jones &​ Bartlett Learning, 2015
 Buku Teks
Nana Mulyana, author
Identifikasi tahapan serangan berdasarkan model Cyber Kill Chain menggunakan elastic stack: studi kasus Lembaga Kebijakan Pengadaan Barang/Jasa Pemerintah = Identifiying attack phase based on Cyber Kill Chain Model using Elastic Stack: case study of Lembaga Kebijakan Pengadaan Barang/Jasa Pemerintah.
Fakultas Teknik Universitas Indonesia, 2020
 UI - Tesis (Membership)
Wood, Michael B., author
Pengenalan keamanan komputer=Introducing computer security
Elex Media Komputindo, 1992
 Buku Teks
Privacy and identity management for life : 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife, International Summer School, Trento, Italy, September 5-9, 2011 : revised selected papers
edited by Jan Camenisch ... [and others]
Springer, 2012
 eBooks