Keamanan Data Smartphone: Difference between revisions
| Line 64: | Line 64: | ||
==Referensi== | ==Referensi== | ||
*[https://inet.detik.com/security/d-5702841/9-ancaman-keamanan-data-di-hp-dan-cara-mengatasinya-bagian-1/2 | *[https://inet.detik.com/security/d-5702841/9-ancaman-keamanan-data-di-hp-dan-cara-mengatasinya-bagian-1/2 detik.com] | ||
*[https://inet.detik.com/security/d-5702852/9-ancaman-keamanan-data-di-hp-dan-cara-mengatasinya-bagian-2?tag_from=wp_nhl_4 | *[https://inet.detik.com/security/d-5702852/9-ancaman-keamanan-data-di-hp-dan-cara-mengatasinya-bagian-2?tag_from=wp_nhl_4 detik.com] | ||
[[Category:Security]] | [[Category:Security]] | ||