Skip to content
No results
  • Home
  • Publikasi
  • Data Science
  • Cyber Security
  • Digital Forensic
  • Webinar

Suwito Pomalingo | Seize The Day

Suwito Pomalingo

Cyber Security Enthusiast, Data Science Hobbyist

  • Home
  • Publikasi
  • Data Science
  • Cyber Security
  • Digital Forensic
  • Webinar
CURRICULUM VITAE
Suwito Pomalingo

Cyber Security Enthusiast, Data Science Hobbyist

Download Salinan UU Nomor 27 Tahun 2022 Tentang Perlindungan Data Pribadi

  • suwitopomssuwitopoms
  • October 18, 2022
  • Produk Hukum

Download Salinan Undang-Undang Nomor 27 Tahun 2022 Tentang Perlindungan Data Pribadi.

Sumber: jdih.setneg.go.id

Salinan-UU-Nomor-27-Tahun-2022Download

Publications

Google Scholar

Categories

  • AI (1)
  • Buku (5)
  • Catatan Riset (2)
  • Cyber Security (9)
  • Cybercrime (14)
  • Data Science (2)
  • Digital Forensic (18)
  • Jejak Perjalanan (13)
  • Linux & OSS (3)
  • Machine Learning (1)
  • Materi Kuliah (2)
  • Open Source Intelligence (2)
  • Produk Hukum (4)
  • Sistem Hacking (2)
  • SQL (3)
  • Webinar (2)

Recent Posts

  • Install Tensorflow 2 dengan Support GPU
    Install Tensorflow 2 dengan Support GPU
    November 19, 2023
  • Mengenal Network Forensic
    Mengenal Network Forensic
    November 17, 2023
  • ChatGPT: Rahasia di Balik Penggunaan yang Optimal
    ChatGPT: Rahasia di Balik Penggunaan yang Optimal
    June 2, 2023
  • Lab Hacking
    Lab Hacking
    June 2, 2023
  • Materi Kuliah Sistem Operasi
    Materi Kuliah Sistem Operasi
    May 31, 2023
  • Metaverse : Dunia Virtual Masa Depan di Era Society 5.0
    Metaverse : Dunia Virtual Masa Depan di Era Society 5.0
    May 30, 2023
  • Sistem Operasi
    Sistem Operasi
    May 30, 2023

Tags

Audit Teknologi Informasi (1) Bukti Digital (10) coffeelovers (1) cybercrime (11) cybercrime ecosystem (2) data analyst (3) desa sade (1) Digital Forensics (14) dvwa (1) fedora20 (1) foto forensik (1) gorontalo (1) hacking tools (1) heisenbug (1) Investigasi (1) justMFG (2) karst (1) keamanan komputer (1) Kontrol Dan Audit (1) Kontrol Dan Audit Teknologi Informasi (1) lab hacking (1) linux (1) locard exchange (1) mac (1) machine learning (1) maltego (1) materi kuliah (1) metaverse (1) MITK (8) Network Forensic (1) OSINT (1) penetration test (1) penipuan online (1) Perlindungan Data Pribadi (1) sci-hub (1) sistem operasi (1) sql (3) tensorflow (1) tensorflow-gpu (1) tutorial hacking (1) ubuntu 20.04 (1) ubuntu virtualbox (1) virtualbox (1) virus (2) windows (1)

RSS The Hackers News

  • U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
  • CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs
  • GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts
  • Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
  • Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
  • Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
  • Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
Copyright © 2025 - WordPress Theme by CreativeThemes