Archive for April, 2020

Books Review CISSP Official Study Guide 7th Edition

April 21, 2020

Are you IT Security Professional? Here it is good book to read for. Here are the complete information about this book:

Title : CISSP Official Study Guide 7th Edition
ISBN : 978-1-119-04271-6
Author : James Michael Stewart et. al.
Publisher : Sybex
Year : 2015
Pages : 1561
This book build from 21 chapters. Chapter 1 describe about Security Governance Through Principles and Policies. Security management concepts and principles are inherent elements in a security policy and solution deployment. They define the basic parameters needed for a secure environment. They also define the goals and objectives that both policy designers and system implementers must achieve to create a secure solution. It is important for real-world security professionals, as well as CISSP exam students, to understand these items thoroughly.

Chapter 2 talking about Personnel Security and Risk Management Concepts. Because of the complexity and importance of hardware and software controls, security management for employees is often overlooked in overall security planning. This chapter explores the human side of security, from establishing secure hiring practices and job descriptions to developing an employee infrastructure. Additionally, we look at how employee training, management, and termination practices are considered an integral part of creating a secure environment. Finally, we examine how to assess and manage security risks.

Chapter 3 contains Business Continuity Planning. Despite our best wishes, disasters of one form or another eventually strike every organization. Whether it’s a natural disaster such as a hurricane or earthquake or a man-made calamity such as a building fire or burst water pipes, every organization will encounter events that threaten their operations or even their very existence. Resilient organizations have plans and procedures in place to help mitigate the effects a disaster has on their continuing operations and to speed the return to normal operations. Recognizing the importance of planning for business continuity and disaster recovery, the International Information Systems Security Certification Consortium (ISC)2 included these two processes in the Common Body of Knowledge for the CISSP program. Knowledge of these fundamental topics will help you prepare for the exam and help you prepare your organization for the unexpected.

Chapter 4 describe about Laws, Regulations, and Compliance. In this chapter, we’ll cover the various types of laws that deal with computer security issues. We’ll examine the legal issues surrounding computer crime, privacy, intellectual property, and a number of other related topics. We’ll also cover basic investigative techniques, including the pros and cons of calling in assistance from law enforcement.
Chapter 5 talking about Protecting Security of Assets. The Asset Security domain focuses on collecting, handling, and protecting information throughout its life cycle. A primary step in this domain is classifying information based on its value to the organization. All follow-on actions vary depending on the classification. For example, highly classified data requires stringent security controls. In contrast, unclassified data uses fewer security controls.

Chapter 6 contains Cryptography and Symmetric Key Algorithms. Cryptography provides added levels of security to data during processing, storage, and communications. Over the years, mathematicians and computer scientists have developed a series of increasingly complex algorithms designed to ensure confidentiality, integrity, authentication, and nonrepudiation. While cryptographers spent time developing strong encryption algorithms, hackers and governments alike devoted significant resources to undermining them. This led to an “arms race” in cryptography and resulted in the development of the extremely sophisticated algorithms in use today. This chapter looks at the history of cryptography, the basics of cryptographic communications, and the fundamental principles of private key cryptosystems.

Chapter 7 describe about PKI and Cryptographic Applications.This chapter explores the world of asymmetric (or public key) cryptography and the public key infrastructure (PKI) that supports worldwide secure communication between parties that don’t necessarily know each other prior to the communication. Asymmetric algorithms provide convenient key exchange mechanisms and are scalable to very large numbers of users, both challenges for users of symmetric cryptosystems. This chapter also explores several practical applications of asymmetric cryptography: securing email, web communications, electronic commerce, digital rights management, and networking. The chapter concludes with an examination of a variety of attacks malicious individuals might use to compromise weak cryptosystems.

Chapter 8 talking about Principles of Security Models, Design, and Capabilities. The process of determining how secure a system is can be difficult and time-consuming. In this chapter, we describe the process of evaluating a computer system’s level of security. We begin by introducing and explaining basic concepts and terminology used to describe information system security concepts and talk about secure computing, secure perimeters, security and access monitors, and kernel code. We turn to security models to explain how access and security controls can be implemented. We also briefly explain how system security may be categorized as either open or closed; describe a set of standard security techniques used to ensure confidentiality, integrity, and availability of data; discuss security controls; and introduce a standard suite of secure networking protocols.

Chapter 9 contains Security Vulnerabilities, Threats, and Countermeasures. In this chapter, we’ll cover those underlying security concerns by conducting a brief survey of a field known as computer architecture: the physical design of computers from various components. We’ll examine each of the major physical components of a computing system—hardware and firmware—from a security perspective. Obviously, the detailed analysis of a system’s hardware components is not always a luxury available to you because of resource and time constraints. However, all security professionals should have at least a basic understanding of these concepts in case they encounter a security incident that reaches down to the system design level.

Chapter 10 describe about Physical Security Requirements. The purpose of physical security is to protect against physical threats. The following physical threats are among the most common: fire and smoke, water (rising/falling), earth movement (earthquakes, landslides, volcanoes), storms (wind, lightning, rain, snow, sleet, ice), sabotage/vandalism, explosion/destruction, building collapse, toxic materials, utility loss (power, heating, cooling, air, water), equipment failure, theft, and personnel loss (strikes, illness, access, transport).

Chapter 11 talking about Secure Network Architecture & Network Components. Computers and networks emerge from the integration of communication devices, storage devices, processing devices, security devices, input devices, output devices, operating systems, software, services, data, and people. The CISSP CBK states that a thorough knowledge of these hardware and software components is an essential element of being able to implement and maintain security. This chapter discusses the OSI model as a guiding principle in networking, cabling, wireless connectivity, TCP/IP and related protocols, networking devices, and firewalls.

Chapter 12 contains Secure Communications and Network Attacks. Communications security is designed to detect, prevent, and even correct data transportation errors (that is, it provides integrity protection as well as confidentiality). This is done to sustain the security of networks while supporting the need to exchange and share data. This chapter covers the many forms of communications security, vulnerabilities, and countermeasures.

Chapter 13 describe about Managing Identity and Authentication. The Identity and Access Management domain focuses on issues related to granting and revoking privileges to access data or perform actions on systems. A primary focus is on identification, authentication, authorization, and accountability. In this chapter and in Chapter 14, Controlling and Monitoring Access,” we discuss all the objectives within the Identity and Access Management domain. Be sure to read and study the materials from both chapters to ensure complete coverage of the essential material for this domain.

Chapter 14 talking about Controlling and Monitoring Access. The method of authorizing subjects to access objects varies depending on the access control method used by the IT system.

Chapter 15 contains Security Assessment and Testing. Security assessment and testing programs perform regular checks to ensure that adequate security controls are in place and that they effectively perform their assigned functions. In this chapter, you’ll learn about many of the assessment and testing controls used by security professionals around the world.

Chapter 16 describe about Managing Security Operations. The Security Operations domain includes a wide range of security foundation concepts and best practices. This includes several core concepts that any organization needs to implement to provide basic security protection. The first section of this chapter covers these concepts. Resource protection ensures the protection of media and other valuable assets throughout the lifetime of the resource. Configuration management ensures that systems are configured similarly, and change management processes protect against outages from unauthorized changes. Patch and vulnerability management controls ensure systems are up-to-date and protected against known vulnerabilities.
Chapter 17 talking about Preventing and Responding to Incidents. Effective incident management helps an organization respond appropriately when attacks occur to limit the scope of an attack. Organizations implement preventive measures to protect against, and detect, attacks, and this chapter covers many of these controls and
countermeasures. Logging, monitoring, and auditing provide assurances that the security controls are in place and are providing the desired protections.

Chapter 18 contain Disaster Recovery Planning. Software development is a complex and challenging task undertaken by developers with many different skill levels and varying security awareness. Applications created and modified by these developers often work with sensitive data and interact with members of the general public. This presents significant risks to enterprise security, and information security professionals must understand these risks, balance them with business requirements, and implement appropriate risk mitigation mechanisms.

Chapter 19 describe about Incidents and Ethics. In this chapter, we explore the process of incident handling, including investigative techniques used to determine whether a computer crime has been committed and to collect evidence when appropriate. This chapter also includes a complete discussion of ethical issues and the code
of conduct for information security practitioners. The first step in deciding how to respond to a computer attack is to know if and when an attack has taken place. You must know how to determine that an attack is occurring, or has occurred, before you can properly choose a course of action. Once you have determined that an incident has occurred, the next step is to conduct an investigation and collect evidence to find out what has happened and determine the extent of any damage that might have been done. You must be sure you conduct the
investigation in accordance with local laws and regulations.

Chapter 20 talking about Software Development Security. Software development is a complex and challenging task undertaken by developers with many different skill levels and varying security awareness. Applications created and modified by these developers often work with sensitive data and interact with members of the general public.
This presents significant risks to enterprise security, and information security professionals must understand these risks, balance them with business requirements, and implement appropriate risk mitigation mechanisms.

Chapter 21 contains Malicious Code and Application Attacks. In previous chapters, you learned about many general security principles and the policy and procedure mechanisms that help security practitioners develop adequate protection against malicious individuals. This chapter takes an in-depth look at some of the specific threats faced on a daily basis by administrators in the field. This material is not only critical for the CISSP exam; it’s also some of the most basic information a computer security professional must understand to effectively practice their trade. We’ll begin this chapter by looking at the risks posed by malicious code objects—viruses, worms, logic bombs, and Trojan horses. We’ll then take a look at some of the other security exploits used by someone attempting to gain unauthorized access to a system or to prevent legitimate users from gaining such
access.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Books Review Beginning Oracle Database 12c Administration

April 17, 2020

Are you Database Administrator or Developer? Here it is good book to read for. Here are the complete information about this book:

Title : Beginning Oracle Database 12c Administration
ISBN : 9781484201947
Author : Ignatius Fernandes
Publisher : Apress
Year : 2015
Pages : xxxii + 346
Price : USD 49.99

This book build from 4 parts and 17 chapters. Part 1 Talking about Database Concepts and consist of 3 chapters: Chapter 1, Chapter 2, and Chapter 3. Chapter 1 is talking about Relational Database Management Systems. Leonardo da Vinci said: “Those who are in love with practice without knowledge are like the sailor who gets into a ship without rudder or compass and who never can be certain [where] he is going. Practice must always be founded on sound theory.” How can you competently administer a relational database management system like Oracle if you don’t really know what makes a “relational” database relational or what a database management system manages for you? This chapter will help you find your bearings and prepare you for what is to come in the rest of the book. However, you probably won’t be satisfied until you’ve seen an Oracle database management system. You will therefore connect to the fully-functional database in a “virtual machine” provided by Oracle Corporation.

Chapter 2 is talking about Structured Query Language or SQL. All database user activity is conducted in Structured Query Language (SQL), and therefore database administrators need to be intimately familiar with it. The greatest potential for performance improvement usually lies within the software application, not within the database where the application stores its data or within the physical infrastructure where the database is housed. An equally important reason why database administrators need to be intimately familiar with SQL is that all database administration activities such as database maintenance and user management are also conducted in SQL. A third reason is that SQL has deficiencies that must be guarded against. These deficiencies include redundancy, problems introduced by nullable data items, and the absence of prohibitions on duplicate data records.

Chapter 3 from this book descibe about Oracle Architecture. Just as an automobile engine has a lot of interconnected parts that must all work well together, and just as an automobile mechanic must understand the individual parts and how they relate to the whole, the Oracle database engine has a lot of interconnected parts, and the database administrator must understand the individual parts and how they relate to the whole. This chapter provides a short overview of the Oracle engine.

Part 2 of this book explain about Database Implementation. The Chapter 4 talking about Planning of databases. Your goal as Oracle administrator is not simply to create a database but to be on time, on budget, and to
meet the availability and performance targets of the business. As with any goal, careful planning is the key to
success. You have little control over a number of factors that affect the success of your database; for example,
application design and testing. This chapter discusses three important issues that are definitely within your
circle of influence and that you cannot afford to ignore: licensing, architecture, and sizing.

Chapter 5 describe about Software Installation. In this chapter, the author go over a few prerequisites such as obtaining the software, installation guides, and reference manuals. Author also discuss the installation of software that precedes the creation of a database. Author show you how to install the Oracle software on laptop running Windows XP Professional.

Chapter 6 from this book talking about Database Creation. Database creation is easier that you would think; it’s the tasks that come before and after that take a lot of time. In this chapter, I’ll first discuss the “Next-Next-Next; click Finish” method of creating a database. Author then briefly discuss some tasks that you should consider performing after you create a database; specifically, installing the RDA and Statspack tools and disabling database features that have not been licensed. Finally, author introduce the manual method of database creation and some basic administrative tasks.

Chapter 7 is talking about Physical Database Design. Performance considerations can come to the forefront at any time during the life of the database; new queries can be introduced at any time. Database administrators must therefore understand the mechanisms that can be used to improve performance, and this chapter discusses three broad categories. Indexes can be used to quickly find the data. Partitions and clusters can be used to organize the data. Finally, materialized views and denormalized tables can be used to perform expensive operations like Joins ahead of time.

Chapter 8 is talking about User Management and Data Loading. Your job does not end when you create a database; you still have to get the data into it and ensure that those who have a need to use it can do so. This chapter discusses how to control users and how to get large amounts of data in and out of databases. User management and data loading are two common chores performed by database administrators.

Part III topic is about Database Support. Chapter 9 is talking about Taking Control. If you are going to be responsible for a database, you need to know what it contains and how it is being used. Which are the biggest tables? How are the data files, control files, and log files laid out? How many people have database accounts? How many people use the database at a time? Your first action when you acquire responsibility for a database should be to thoroughly explore it. In this chapter, you’ll learn about form-based tools such as Enterprise Manager, SQL Developer, and Remote Diagnostic Agent which make it easy to explore the database and simplify the task of database administration.

Chapter 10 is talking about Monitoring. The database administrator is responsible for watching the database. If something goes wrong with the database that could have been prevented, there is nobody else to blame. As you’ll learn in this chapter, database availability, changes, security, growth, backups, workload, performance, and capacity are some of the areas that should be monitored.

Chapter 11 is talking about Fixing Problems. In this chapter, you will watch a real-life problem as it progresses from detection to resolution. You will learn a five-step systematic approach to problem-fixing and the difference between incident management and problem management. I will cover the variety of Internet resources that are available to you, introduce an Oracle knowledge base called MetaLink, and explain how to get technical support from Oracle Corporation.

Chapter 12 is talking about Backups. Backups are to a database what fire stations and fire fighters are to a city; we may protect the database against damage the best we can, but we must be prepared if the database ever gets damaged, through user or operator error or hardware failure, and needs to be repaired. In this chapter you’ll learn about the different kinds of backups and the tools used to create them.

Chapter 13 is talking about Recovery. In the previous chapter, you learned how to make backup copies of the database; you will now turn your attention to repairing the database if it gets damaged.

Chapter 14 is talking about Maintenance. In this chapter, we go over the maintenance that is needed to keep your database in peak operating condition.

Chapter 15 is talking about The Big Picture and the Ten Deliverables. Competency in Oracle technology is only half of the challenge of being a database administrator. If you had very little knowledge of Oracle technology but knew exactly what needed to be done, you could always find out how to do it—there is Google and there are online manuals a-plenty. Too many Oracle database administrators don’t know what to do and what they have when they are through is “just a mess without a clue.”

Part IV from this book contain Database Tuning topic. Chapter 16 is talking about Database Tuning. Database tuning can be a complex exercise but it can be facilitated by a systematic approach. This chapter describes a systematic five-step approach to performance tuning. It also presents the most important tools provided by Oracle to help with performance tuning; Statspack is emphasized because newer tools such as AWR and ADDM require costly licenses and are not available at most sites. In particular, you will learn a powerful method of mining the Statspack repository for data on performance trends. A highlight of this chapter is the very detailed performance tuning exercise at the end; it will reinforce the lessons of the chapter.

Chapter 17 or the last chapter from this book talking about SQL Tuning. Perhaps the most complex problem in database administration is SQL tuning. The paucity of books devoted to SQL tuning is evidence of the difficulty of the topic. The only way to interact with Oracle, to retrieve data, to change data, to administer the database, is via SQL. Oracle itself uses SQL to perform all the work that it does behind the scenes. SQL performance is therefore the key to database performance; all database performance problems are really SQL performance problems even if they express themselves as contention for resources. In this chapter, the author present some of the causes of inefficient SQL and some of the common techniques of making SQL more efficient. Most of the time will be spent working through a case study; the author will show you a fairly typical SQL statement and improve it in stages until it hits the theoretical maximum level of performance that is possible to achieve.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Books Review Penetration Testing with BackBox

April 14, 2020

Are IT Security Analyst, IT Security Engineer or Other Information Security Personel? Here it is good book to read for. Here are the complete information about this book:

Title : Penetration Testing with BackBox
ISBN : 978-1-78328-297-5
Author : Stefan Umit Uygur
Publisher : Packt Publishing
Year : 2014
Pages : 113

This book consist of 8 chapters. Chapter 1 describe about Starting Out with BackBox Linux. Chapter 2 explain Information Gathering. Chapter 3 talking about Vulnerability Assessment and Management. Chapter 4 explaining about Exploitation of a SQL injection on a database and exploiting web applications with W3af.

Chapter 5 is talking about Eavesdropping and Privilege Escalation. Chapter 6 describe about Maintaining Access. Chapter 7 talking about Penetration Testing Methodologies with BackBox. Chapter 8 is the last chapter in this book and talking about Documentation and Reporting for Penetration Testing.

This book good for those of you who want to learn about computer and network security, primary for security analyst and security engineer.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Books Review Oracle SQL Jumpstart with Examples

April 10, 2020

Are you SQL Developer, Programmer or DBA? Here it is good book to read for. Here are the complete information about this book:

Title : Oracle SQL Jumpstart with Examples
ISBN : 1-55558-323-7
Author : Gavin Powell
Publisher : Elsevier Digital Press
Year : 2005
Pages : xxx + 652

This book consist of chapters 24. Chapter 1 talking about Introduction to Oracle SQL. Chapter 2 talking about New Features of Oracle SQL. Chapter 3 talking about Oracle Database Architecture. Chapter 4 talking about The SELECT Statement. Chapter 5 content is Filtering Rows. Chapter 6 consist of Sorting Rows.
Chapter 7 content is about Operators, Conditions, and Pseudocolumns in Oracle Database. Chapter 8 is talking about Using SQL*Plus.

Chapter 9 content is Single-Row Functions. Chapter 10 is talking about Joining Tables. Chapter 11 content is Grouping and Summarizing Data. Chapter 12 is talking about 12 Subqueries. Chapter 13 content is Unusual Query Types. Chapter 14 is talking about Expressions. Chapter 15 content is Data Manipulation Language (DML). Chapter 16 is talking about Datatypes and Collections. Chapter 17 content is XML in Oracle. Chapter 18 is about Tables. Chapter 19 is talking about Views. Chapter 20 consist of Constraints.

Chapter 21 talking about Indexes and Clusters. Chapter 22 consist of Sequences and Synonyms. Chapter 23 talking about Security. Chapter 24 is talking about Basic PL/SQL.

This book good for those of you who want to learn about database, especially Oracle.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Resensi Buku Champion

April 7, 2020

Buat kamu yang merasa sedang down/jatuh, ini ada buku yang bagus untuk memotivasi kamu kembali. Ini judul bukunya:

Judul : Champion
ISBN : 978-602-02-0345
Pengarang : Darmadi Darmawangsa
Penerbit : Elex Media Komputindo
Tahun Terbit : 2008
Jumlah Halaman : xxxii + 368

Buku ini membawakan 101 Tip Motivasi dan Inspirasi Sukses menjadi Juara Sejati. Buku ini tidak diperuntukkan bagi mereka yang berjiwa lemah, berpikiran kerdil, tanpa tujuan yang jelas, mudah mengeluh dan hanya mencari jalan termudah untuk mencapai kesuksesan.

Champion adalah buku yang khusus dibuat bagi mereka yang sangat merindukan pencapaian sukses yang besar. Champion berisi cerita inspirasi, teguran, refleksi diri, cara pikir, serta tindakan-tindakan raksasa yang perlu diambil untuk meraih kesuksesan.

Buku ini bagus dibaca untuk kamu yang sedang berjuang di bidang apapun. Baik kamu yang belum merasa sukses, sudah sukses, dan bagi ingin yang meraih kesuksesan lebih.

Buku ini bisa kamu dapatkan di toko buku terdekat di kota kamu atau toko buku online yang banyak terdapat di Internet.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Resensi Buku British vs American English

April 3, 2020

Buat kamu yang sedang belajar Bahasa Inggris, kamu harus tahu perbedaan antara British English dengan American English. Ini judul bukunya:

Judul : British vs American English
ISBN : 978-602-352-010-7
Pengarang : Asfi Aniuranti dan Niswatin Nurul Hidayati
Penerbit : Azka Pressindo
Tahun Terbit : 2016
Jumlah Halaman : viii + 144

Ada perbedaan antara Bahasa Inggris aksen British dengan American. Semuanya dikupas di dalam buku ini. Ada beberapa perbedaan antara British dengan Merika, antara lain perbedaan kosakata, perbedaan ejaan dan perbedaan grammatika. Mungkin secara sekilas kamu tidak bisa membedakan, tapi kalau kamu belajar lebih mendalam maka akan terlihat perbedaannya. Coba kamu perhatikan Film Harry Potter, aksen yang digunakan adalah aksen British. Juga di dalam film James Bond 007. Bandingkan dengan Serial Friends yang menggunakan aksen Amerika.

Buku ini juga berisi latihan agar kamu bisa semakin membedakan aksen British dengan American. Di buku ini juga memasukkan CD Audio agar kamu bisa berlatih aksen British dan Amerika. Selain itu buku ini juga menyediakan bonus berupa tempat-tempat menarik di UK dan US.

Buku ini merupakan buku yang bagus untuk dimiliki buat kamu yang sedang belajar bahasa Inggris, juga untuk persiapan mengambil ujian IELTS. Buku ini bisa kamu dapatkan di toko buku terdekat di kota kamu atau toko buku online yang banyak terdapat di Internet.

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang

Sertifikasi Internasional Cisco CCNP Data Center Launching Tanggal 24 Februari 2020

April 1, 2020

Buat kamu yang berprofesi sebagai Network Engineer, tanggal 24 Februari 2020 ada ujian Cisco CCNP Data Center yang baru. Karena ini ujian baru tentu saja ada yang berubah di materi ujian atau exam objectives nya. Untuk mendapatkan Sertifikasi Internasional Cisco CCNP Data Center yang baru ini kamu harus ikut ujian dengan nomor 350-601 di Pearson VUE Testing Center yang ada di seluruh Indonesia.

Harga Ujiannya Sendiri : 400 USD (Indonesia)

Supaya kamu lulus ujian Cisco CCNP 350-601, kamu harus tahu apa saja yang bakal diujikan di dalam ujian tersebut. Kamu harus mengetahui exam objective Cisco CCNP Data Center 350-601 yang ada di bawah ini:

1.0 Network (25%)
1.1 Apply routing protocols
1.1.a OSPFv2, OSPFv3
1.1.b MP-BGP
1.1.c PIM
1.1.d FHRP
1.2 Apply switching protocols such as RSTP+, LACP and vPC
1.3 Apply overlay protocols such as VXLAN EVPN and OTV
1.4 Apply ACI concepts
1.4.a Fabric setup
1.4.b Access policies
1.4.c VMM
1.4.d Tenant policies
1.5 Analyze packet flow (unicast, multicast, and broadcast)
1.6 Analyze Cloud service and deployment models (NIST 800-145)
1.7 Describe software updates and their impacts
1.7.a Disruptive / nondisruptive
1.7.b EPLD
1.7.c Patches
1.8 Implement network configuration management
1.9 Implement infrastructure monitoring such as NetFlow and SPAN
1.10 Explain network assurance concepts such as streaming telemetry

2.0 Compute (25%)
2.1 Implement Cisco Unified Compute System Rack Servers
2.2 Implement Cisco Unified Compute System Blade Chassis
2.2.a Initial setup
2.2.b Infrastructure management
2.2.c Network management (VLANs, pools and policies, templates, QoS)
2.2.d Storage management (SAN connectivity, Fibre Channel zoning, VSANs, WWN pools, SAN policies, templates)
2.2.e Server management (Server pools and boot policies)
2.3 Explain HyperFlex Infrastructure Concepts and benefits (Edge and Hybrid Architecture vs all-flash)
2.4 Describe firmware and software updates and their impacts on B-Series and C-Series servers
2.5 Implement compute configuration management (Backup and restore)
2.6 Implement infrastructure monitoring such as SPAN and Intersight

3.0 Storage Network (20%)
3.1 Implement Fibre Channel
3.1.a Switch fabric initialization
3.1.b Port channels
3.1.c FCID
3.1.d CFS
3.1.e Zoning
3.1.f FCNS
3.1.g Device alias
3.1.h NPV and NPIV
3.1.i VSAN
3.2 Implement FCoE Unified Fabric (FIP and DCB)
3.3 Describe NFS and NAS concepts
3.4 Describe software updates and their impacts (Disruptive/nondisruptive and EPLD)
3.5 Implement infrastructure monitoring

4.0 Automation (15%)
4.1 Implement automation and scripting tools
4.1.a EEM
4.1.b Scheduler
4.1.c Bash Shell and Guest Shell for NX-OS
4.1.d REST API
4.1.e JSON and XML encodings
4.2 Evaluate automation and orchestration technologies
4.2.a Ansible
4.2.b Puppet
4.2.c Python
4.2.d POAP
4.2.e DCNM
4.2.f UCSD
4.2.g PowerShell

5.0 Security (15%)
5.1 Apply network security
5.1.a AAA and RBAC
5.1.b ACI contracts and microsegmentation
5.1.c First-hop security features such as dynamic ARP inspection (DAI), DHCP snooping, and port security
5.1.d CoPP
5.2 Apply compute security
5.2.a AAA and RBAC
5.2.b Keychain authentication
5.3 Apply storage security
5.3.a AAA and RBAC
5.3.b Port security
5.3.c Fabric binding

Nah, itulah beberapa exam objective yang akan diujikan di dalam Sertifikasi Internasional Cisco CCNP Data Center. Biar kamu lulus ujian Cisco CCNP Data Center, kamu bisa lihat tips-tips nya disini ya:

Untuk info mengenai Sertifikasi Internasional Cisco kamu bisa klik link disini ya:

Cisco Certification : https://youtu.be/zIgl290cr8o

Untuk info mengenai Network Engineer kamu bisa klik link disini ya:

Profesi Network Engineer : https://youtu.be/M_kkYdeVuVQ

Untuk artikel dan tutorial seputar IT kamu bisa kunjungi web saya berikut ini:

https://bukutrainingns.blogspot.com/

Buat kamu yang mau belajar berbagai macam materi Teknologi Informasi, kamu bisa melihat kumpulan tutorialnya disini :

1. Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html

2. Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html

3. Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html

4. Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html

5. Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html

6. Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html

7. Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html

8. Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html

9. Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html

10. Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html

11. Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html

12. Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html

13. Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html

14. Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html

15. Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html

16. Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html

17. Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html

18. Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html

19. SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html

20. Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html

21. Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html

22. VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

Untuk video tutorial seputar IT dan lainnya kamu bisa kunjungi Channel YouTube saya disini ya:

https://www.youtube.com/channel/UCikwGDYfTFWQxdiCqKvx6_w

Semoga bermanfaat.
Salam

Nanang