{"id":6477,"date":"2025-06-16T14:41:45","date_gmt":"2025-06-16T07:41:45","guid":{"rendered":"https:\/\/nasmedia.id\/store\/?p=6477"},"modified":"2025-06-20T15:11:47","modified_gmt":"2025-06-20T08:11:47","slug":"cyber-security-thrive-technology-review-and-research","status":"publish","type":"post","link":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/","title":{"rendered":"Cyber Security: Thrive Technology, Review And Research"},"content":{"rendered":"<figure><\/figure>\n<p>Dr. Eddy Yansen, MSC<\/p>\n<p>Retno Setiawati, S.H<\/p>\n<p>Benny Rahmat<\/p>\n<p>Rp.70.000<\/p>\n<p>Deskripsi<\/p>\n<p>Cyber Security, atau keamanan cyber, adalah praktik melindungi sistem komputer, jaringan, perangkat lunak, dan data dari serangan digital, akses yang tidak sah, kerusakan, atau pencurian. Ini melibatkan berbagai teknologi, proses, dan kontrol yang dirancang untuk menjaga kerahasiaan, integritas, dan ketersediaan informasi. Keamanan cyber mencakup banyak aspek, mulai dari keamanan jaringan dan aplikasi hingga keamanan data dan perangkat.<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Halaman<\/strong><\/td>\n<td><strong>Penerbit<\/strong><\/td>\n<\/tr>\n<tr>\n<td>x + 190 hlm<\/td>\n<td>PT. Nas Media Indonesia<\/td>\n<\/tr>\n<tr>\n<td><strong>ISBN<\/strong><\/td>\n<td><strong>E-ISBN<\/strong><\/td>\n<\/tr>\n<tr>\n<td>XXXXXXXXXXXXXXXXXXX<\/td>\n<td>XXXXXXXXXXXXXXXXXXX<\/td>\n<\/tr>\n<tr>\n<td><strong>Ukuran<\/strong><\/td>\n<td><strong>Bahasa<\/strong><\/td>\n<\/tr>\n<tr>\n<td>14,5\u00a0 x 20,5\u00a0 cm<\/td>\n<td>Indonesia<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr. Eddy Yansen, MSC Retno Setiawati, S.H Benny Rahmat Rp.70.000 Deskripsi Cyber Security, atau keamanan cyber, adalah praktik melindungi sistem komputer, jaringan, perangkat lunak, dan data dari serangan digital, akses yang tidak sah, kerusakan, atau pencurian. Ini melibatkan berbagai teknologi, proses, dan kontrol yang dirancang untuk menjaga kerahasiaan, integritas, dan ketersediaan informasi. Keamanan cyber mencakup&hellip;&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":6478,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[8,11],"tags":[],"class_list":["post-6477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bookstore","category-tracking-buku"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security: Thrive Technology, Review And Research - Nasmedia.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id\" \/>\n<meta property=\"og:description\" content=\"Dr. Eddy Yansen, MSC Retno Setiawati, S.H Benny Rahmat Rp.70.000 Deskripsi Cyber Security, atau keamanan cyber, adalah praktik melindungi sistem komputer, jaringan, perangkat lunak, dan data dari serangan digital, akses yang tidak sah, kerusakan, atau pencurian. Ini melibatkan berbagai teknologi, proses, dan kontrol yang dirancang untuk menjaga kerahasiaan, integritas, dan ketersediaan informasi. Keamanan cyber mencakup&hellip;&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Nasmedia.id\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-16T07:41:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T08:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"619\" \/>\n\t<meta property=\"og:image:height\" content=\"883\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tompes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"tompes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/\"},\"author\":{\"name\":\"tompes\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/#\\\/schema\\\/person\\\/036f9ff08657c70b36e91869737317d2\"},\"headline\":\"Cyber Security: Thrive Technology, Review And Research\",\"datePublished\":\"2025-06-16T07:41:45+00:00\",\"dateModified\":\"2025-06-20T08:11:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/\"},\"wordCount\":94,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg\",\"articleSection\":[\"Bookstore\",\"Tracking Buku\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/\",\"url\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/\",\"name\":\"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg\",\"datePublished\":\"2025-06-16T07:41:45+00:00\",\"dateModified\":\"2025-06-20T08:11:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/#\\\/schema\\\/person\\\/036f9ff08657c70b36e91869737317d2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg\",\"contentUrl\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg\",\"width\":619,\"height\":883},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/cyber-security-thrive-technology-review-and-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security: Thrive Technology, Review And Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/#website\",\"url\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/\",\"name\":\"Nasmedia.id\",\"description\":\"Penerbit dan Percetakan Buku Murah\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/#\\\/schema\\\/person\\\/036f9ff08657c70b36e91869737317d2\",\"name\":\"tompes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/litespeed\\\/avatar\\\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514\",\"url\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/litespeed\\\/avatar\\\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514\",\"contentUrl\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/wp-content\\\/litespeed\\\/avatar\\\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514\",\"caption\":\"tompes\"},\"sameAs\":[\"https:\\\/\\\/nasmedia.id\\\/store\"],\"url\":\"https:\\\/\\\/nasmedia.id\\\/store\\\/author\\\/tompes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/","og_locale":"id_ID","og_type":"article","og_title":"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id","og_description":"Dr. Eddy Yansen, MSC Retno Setiawati, S.H Benny Rahmat Rp.70.000 Deskripsi Cyber Security, atau keamanan cyber, adalah praktik melindungi sistem komputer, jaringan, perangkat lunak, dan data dari serangan digital, akses yang tidak sah, kerusakan, atau pencurian. Ini melibatkan berbagai teknologi, proses, dan kontrol yang dirancang untuk menjaga kerahasiaan, integritas, dan ketersediaan informasi. Keamanan cyber mencakup&hellip;&nbsp;","og_url":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/","og_site_name":"Nasmedia.id","article_published_time":"2025-06-16T07:41:45+00:00","article_modified_time":"2025-06-20T08:11:47+00:00","og_image":[{"width":619,"height":883,"url":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","type":"image\/jpeg"}],"author":"tompes","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"tompes","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#article","isPartOf":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/"},"author":{"name":"tompes","@id":"https:\/\/nasmedia.id\/store\/#\/schema\/person\/036f9ff08657c70b36e91869737317d2"},"headline":"Cyber Security: Thrive Technology, Review And Research","datePublished":"2025-06-16T07:41:45+00:00","dateModified":"2025-06-20T08:11:47+00:00","mainEntityOfPage":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/"},"wordCount":94,"commentCount":0,"image":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#primaryimage"},"thumbnailUrl":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","articleSection":["Bookstore","Tracking Buku"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/","url":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/","name":"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id","isPartOf":{"@id":"https:\/\/nasmedia.id\/store\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#primaryimage"},"image":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#primaryimage"},"thumbnailUrl":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","datePublished":"2025-06-16T07:41:45+00:00","dateModified":"2025-06-20T08:11:47+00:00","author":{"@id":"https:\/\/nasmedia.id\/store\/#\/schema\/person\/036f9ff08657c70b36e91869737317d2"},"breadcrumb":{"@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#primaryimage","url":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","contentUrl":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","width":619,"height":883},{"@type":"BreadcrumbList","@id":"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nasmedia.id\/store\/"},{"@type":"ListItem","position":2,"name":"Cyber Security: Thrive Technology, Review And Research"}]},{"@type":"WebSite","@id":"https:\/\/nasmedia.id\/store\/#website","url":"https:\/\/nasmedia.id\/store\/","name":"Nasmedia.id","description":"Penerbit dan Percetakan Buku Murah","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nasmedia.id\/store\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/nasmedia.id\/store\/#\/schema\/person\/036f9ff08657c70b36e91869737317d2","name":"tompes","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/nasmedia.id\/store\/wp-content\/litespeed\/avatar\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514","url":"https:\/\/nasmedia.id\/store\/wp-content\/litespeed\/avatar\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514","contentUrl":"https:\/\/nasmedia.id\/store\/wp-content\/litespeed\/avatar\/1b9c40d7997057158eaa304dc9e070e4.jpg?ver=1777711514","caption":"tompes"},"sameAs":["https:\/\/nasmedia.id\/store"],"url":"https:\/\/nasmedia.id\/store\/author\/tompes\/"}]}},"_links":{"self":[{"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/posts\/6477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/comments?post=6477"}],"version-history":[{"count":1,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/posts\/6477\/revisions"}],"predecessor-version":[{"id":6479,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/posts\/6477\/revisions\/6479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/media\/6478"}],"wp:attachment":[{"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/media?parent=6477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/categories?post=6477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nasmedia.id\/store\/wp-json\/wp\/v2\/tags?post=6477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}