{"id":22523,"date":"2021-01-20T09:47:50","date_gmt":"2021-01-20T02:47:50","guid":{"rendered":"https:\/\/www.ciputra.ac.id\/library\/?p=22523"},"modified":"2021-01-20T11:23:26","modified_gmt":"2021-01-20T04:23:26","slug":"keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos","status":"publish","type":"post","link":"https:\/\/www.ciputra.ac.id\/library\/en\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/","title":{"rendered":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22525 aligncenter\" src=\"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg\" alt=\"\" width=\"430\" height=\"540\" srcset=\"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg 430w, https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-239x300.jpg 239w\" sizes=\"auto, (max-width: 430px) 100vw, 430px\" \/><\/p>\n<p>Judul\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : H@CK3R\u2019s SECRETS for CEOs<\/p>\n<p>Call No.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 005.8<\/p>\n<p>Publisher\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Bornrich Publishing<\/p>\n<p>Author(s)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Gildan Arvin Deograt Lumy<\/p>\n<p>Publisher Years\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Agustus 2016<\/p>\n<p>Height\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 14 x 21 cm<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-22526 alignleft\" src=\"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret.jpg\" alt=\"\" width=\"212\" height=\"306\" srcset=\"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret.jpg 780w, https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret-208x300.jpg 208w, https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret-714x1030.jpg 714w, https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret-768x1108.jpg 768w, https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker-secret-489x705.jpg 489w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><\/p>\n<p>Buku ini merupakan bacaan wajib bagi kita semua baik mahasiswa, pelajar, pengajar, praktisi bisnis, petinggi organisasi, pejabat negara pada era digital saat ini. Buku ini menjelaskan secara mudah dan gamblang bahwa informasi yang tidak dikendalikan sesuai risiko dan dampak (keamanan informasi) akan berdampak buruk pada keselamatan jiwa, hukum, keuangan, bisnis, pendanaan teroris, kedaulatan nasional, pertahanan negara, dan masa depan bangsa Indonesia.<\/p>\n<p>Buku ini akan mengubah cara pandang (mind-set) jika anda peduli pada informasi yang sekarang &#8220;bukan lagi hanya Tuhan yang tahu&#8221;. Jangan lagi ada pendapat bahwa keamanan informasi dan keamanan siber adalah semata-mata tanggung jawab orang TI (Teknologi Informasi). Informasi adalah tanggung jawab ANDA, begitu pula Keamanan Informasi yang didalamnya ada Keamanan Siber.<\/p>\n<p>Buku ini sendiri ditulis oleh seorang praktisi IT yang sudah senior di bidangnya. Buku ini sangat cocok dan bagus bagi orang-orang yang ingin mengerti mengenai bidang cyber di internet. Berbagai contoh dari kasus membobolah IT yang ada di dunia ini dijelaskan dalam buku ini dan kita dapat mempelajari bagaimana situasi keamanan IT yang harus kita waspadai keberadaannya, sebab banyak pihak yang dapat meretas data-data penting yang kita miliki dari dunia maya yaitu internet. Bila anda seorang pengusaha tentu buku ini sangat berguna karena anda bisa melihat gambaran dari sisi buruk ketika perusahaan yang anda miliki sudah terkoneksi dengan internet yang tentunya membuat perusahaan anda sudah serba terkoneksi dan melihat sisi buruknya.<\/p>\n<p>Dengan adanya buku ini menjadikan kita para pengguna internet dapat lebih berhati-hati dengan penyebaran data kita didnia maya yang dimana pada awalnya kita tidak memahami dan memikirkan resiko yang dapat kita terima dengan adanya informasi ke tangan-tangan orang yang ingin menggunkannya untuk kejahatan.<\/p>\n<p>&nbsp;<\/p>\n<p>Kelebihan buku ini:<\/p>\n<ol>\n<li>Buku ini ditulis dengan bahasa yang mudah dipahami<\/li>\n<li>Banyak contoh-contoh kasus sehingga kita dapat memahami seperti apa penggunaan IT sesungguhnya<\/li>\n<li>Buku ini dapat dibaca oleh semua orang yang ingin mengerti bidang IT<\/li>\n<\/ol>\n<p>Kekurangan buku ini:<\/p>\n<ol>\n<li>Buku tidak memiliki gambar yang dapat membantu pembaca memahami buku ini.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Judul\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : H@CK3R\u2019s SECRETS for CEOs Call No.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 005.8 Publisher\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Bornrich Publishing Author(s)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Gildan Arvin Deograt Lumy Publisher Years\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Agustus 2016 Height\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 14 x 21 cm &nbsp; Buku ini merupakan bacaan wajib bagi kita semua baik mahasiswa, pelajar, pengajar, praktisi bisnis, petinggi organisasi, pejabat negara pada era digital saat ini&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100],"tags":[],"class_list":["post-22523","post","type-post","status-publish","format-standard","hentry","category-library-info"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library\" \/>\n<meta property=\"og:description\" content=\"Judul\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : H@CK3R\u2019s SECRETS for CEOs Call No.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 005.8 Publisher\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Bornrich Publishing Author(s)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Gildan Arvin Deograt Lumy Publisher Years\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Agustus 2016 Height\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 14 x 21 cm &nbsp; Buku ini merupakan bacaan wajib bagi kita semua baik mahasiswa, pelajar, pengajar, praktisi bisnis, petinggi organisasi, pejabat negara pada era digital saat ini....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/\" \/>\n<meta property=\"og:site_name\" content=\"Library\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-20T02:47:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-20T04:23:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"430\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin_library\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_library\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/\"},\"author\":{\"name\":\"admin_library\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\"},\"headline\":\"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d)\",\"datePublished\":\"2021-01-20T02:47:50+00:00\",\"dateModified\":\"2021-01-20T04:23:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/\"},\"wordCount\":357,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.uc.ac.id\\\/library\\\/2021\\\/01\\\/hacker.jpg\",\"articleSection\":[\"Library Info\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/\",\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/\",\"name\":\"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.uc.ac.id\\\/library\\\/2021\\\/01\\\/hacker.jpg\",\"datePublished\":\"2021-01-20T02:47:50+00:00\",\"dateModified\":\"2021-01-20T04:23:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/static.uc.ac.id\\\/library\\\/2021\\\/01\\\/hacker.jpg\",\"contentUrl\":\"https:\\\/\\\/static.uc.ac.id\\\/library\\\/2021\\\/01\\\/hacker.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#website\",\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/\",\"name\":\"Library\",\"description\":\"UC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\",\"name\":\"admin_library\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"caption\":\"admin_library\"},\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/en\\\/author\\\/admin_library\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/","og_locale":"en_US","og_type":"article","og_title":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library","og_description":"Judul\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : H@CK3R\u2019s SECRETS for CEOs Call No.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 005.8 Publisher\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Bornrich Publishing Author(s)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Gildan Arvin Deograt Lumy Publisher Years\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : Agustus 2016 Height\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 : 14 x 21 cm &nbsp; Buku ini merupakan bacaan wajib bagi kita semua baik mahasiswa, pelajar, pengajar, praktisi bisnis, petinggi organisasi, pejabat negara pada era digital saat ini....","og_url":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/","og_site_name":"Library","article_published_time":"2021-01-20T02:47:50+00:00","article_modified_time":"2021-01-20T04:23:26+00:00","og_image":[{"width":430,"height":540,"url":"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg","type":"image\/jpeg"}],"author":"admin_library","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin_library","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#article","isPartOf":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/"},"author":{"name":"admin_library","@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824"},"headline":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d)","datePublished":"2021-01-20T02:47:50+00:00","dateModified":"2021-01-20T04:23:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/"},"wordCount":357,"commentCount":0,"image":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#primaryimage"},"thumbnailUrl":"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg","articleSection":["Library Info"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/","url":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/","name":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d) - Library","isPartOf":{"@id":"https:\/\/www.ciputra.ac.id\/library\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#primaryimage"},"image":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#primaryimage"},"thumbnailUrl":"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg","datePublished":"2021-01-20T02:47:50+00:00","dateModified":"2021-01-20T04:23:26+00:00","author":{"@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824"},"breadcrumb":{"@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#primaryimage","url":"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg","contentUrl":"https:\/\/static.uc.ac.id\/library\/2021\/01\/hacker.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ciputra.ac.id\/library\/keamanan-informasi-adalah-tanggung-jawab-anda-book-review-hck3rs-secrets-for-ceos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ciputra.ac.id\/library\/en\/"},{"@type":"ListItem","position":2,"name":"Cermat Dengan Keamanan Informasi Pribadi (Book Review \u201cH@CK3R\u2019s SECRETS for CEOs\u201d)"}]},{"@type":"WebSite","@id":"https:\/\/www.ciputra.ac.id\/library\/#website","url":"https:\/\/www.ciputra.ac.id\/library\/","name":"Library","description":"UC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ciputra.ac.id\/library\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824","name":"admin_library","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","caption":"admin_library"},"url":"https:\/\/www.ciputra.ac.id\/library\/en\/author\/admin_library\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/posts\/22523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/comments?post=22523"}],"version-history":[{"count":3,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/posts\/22523\/revisions"}],"predecessor-version":[{"id":22574,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/posts\/22523\/revisions\/22574"}],"wp:attachment":[{"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/media?parent=22523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/categories?post=22523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/en\/wp-json\/wp\/v2\/tags?post=22523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}