Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Asset Search
Library Search
Rooms Restriction Values
All Fields
Title
Author
Keyword in Author headings
Subject
Keyword in Subject headings
ISBN
8
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Narrowed by:
+
Subject: Computer security
Author
Include
Exclude
Cannon, J.C
(4)
Hassan Noor, Dr., editor.
(4)
Merkow, Mark S.
(4)
Herrmann, Francine
(3)
Khadraoui, Djamel
(3)
Ligh, Michael W.
(3)
Abu Bakar Munir
(2)
Carvey, Harlan
(2)
Geier, Eric
(2)
Geier, Jim
(2)
Java Creativity, author.
(2)
Kurniawan, Dedik, author.
(2)
LeBlanc, David
(2)
Muhammad Haiqal
(2)
Nik Fauzi, translator.
(2)
Sawicki, Ed
(2)
Scambray, Joel
(2)
Shah Amirul Azim, editor.
(2)
Wan Ahmad, translator.
(2)
Wells, Nicholas
(2)
-
(1)
Adi, Arista Prasetyo, author.
(1)
Akhyari Nasir, author.
(1)
Alsaggoff, Syed Zulkarnain Syed Idrus, author.
(1)
Amiza Amir, author
(1)
Anzaldua, Reynaldo
(1)
Azham Ahmad, author.
(1)
Bellettini, Carlo, 1967-
(1)
Bhunia,Swarup
(1)
Bishop, Matt
(1)
Bond, Robert
(1)
Boone, J.V.
(1)
Brown, Keith
(1)
Brownstein, Rob
(1)
Byrnes, F. Christian
(1)
Calder, Alan
(1)
Campagna, Rich R.
(1)
Campbell, Stuart
(1)
Chiesa, Raoul, 1973-
(1)
Ciappi, Silvio
(1)
Day, Kevin
(1)
Demaio, Harry B.
(1)
Dhillon, Gupreet
(1)
Ducci, Stefania
(1)
Efzy Zam, author.
(1)
Fadia, Ankit.
(1)
Farmer, Dan
(1)
Fugini, Mariagrazia, 1957-
(1)
Fumy, Walter
(1)
Gentile, Michael
(1)
Godwin, Jana
(1)
Goldstein, Emmanuel J.
(1)
Gordon, Lawrence A.
(1)
Gregory, Peter H.
(1)
Heiser, Jay G.
(1)
Hoglund, Greg
(1)
Howard, Michael
(1)
Howard, Micheal, 1965-
(1)
Izyan Khalidah Wasli, editor.
(1)
K.Dr.
(1)
Kahn, Miriam.
(1)
Kim, David
(1)
Koved, Larry
(1)
Kruse II, Warren G.
(1)
Laila Mat Kiah
(1)
Layton, Timothy P.
(1)
Lekkas, Panos C.
(1)
Lukmanulhakim Ngah, author.
(1)
Marzolf, Julie Schwab
(1)
Masnizah Mohd
(1)
Masnizah Mohd., editor.
(1)
McCarthy, Mary Pat
(1)
McLean, Ian
(1)
Merkow, Mark
(1)
Miller, Michael 1958-
(1)
Mitnick, Kevin D.
(1)
Moorhouse, Karin
(1)
Nagaratnam, Nataraj
(1)
Nichols, Randall K.
(1)
Noor Suhana Sulaiman
(1)
Nor Hanis Hashim, editor.
(1)
Okereafor, Kenneth
(1)
Omar Zakaria
(1)
Palmer, Brandon
(1)
Pankaj Kumar
(1)
Parenty, Thomas J.
(1)
Patterson, Tom
(1)
Petrocelli, Tom
(1)
Pistoia, Marco
(1)
Proctor, Paul E.
(1)
Rosnah Yassin, editor.
(1)
Sakinah Ali Pitchay, Dr., editor.
(1)
Sanjaya, Ridwan, author.
(1)
Schneier, Bruce
(1)
Schou, Corey
(1)
Shea, Therese
(1)
Shema, Mike
(1)
Shoemaker, Dan
(1)
Shostack, Adam
(1)
Simon, William L.
(1)
Siti Hajar Mohd Yasin
(1)
Skoudis, Ed
(1)
Slade, Robert
(1)
Stamp, Mark
(1)
Venema, Wietse
(1)
Verton, Dan
(1)
Viega, John
(1)
Volonino, Linda
(1)
Wan Aniul Alyani Wan Mohamed, author.
(1)
Wan Fariza Paizi@Fauzi, editor.
(1)
Watkins, Steve
(1)
Worley, Becky
(1)
Zaheera Zainal Abidin
(1)
More
View All
Fewer
Collapse All
Format
Include
Exclude
Books
(97)
Language
Include
Exclude
English
(41)
Malay
(9)
Library
Include
Exclude
Perpustakaan Jabatan
Perpustakaan Kuala Lumpur
Perpustakaan Kuala Lumpur, Bandar Sri Permaisuri
Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul
Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak
Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak
Perpustakaan Kuala Lumpur, Cawangan Gombak Setia
Perpustakaan Kuala Lumpur, Cawangan Muhibbah
Perpustakaan Kuala Lumpur, Cawangan Setiawangsa
Perpustakaan Kuala Lumpur, Cawangan Sri Pantai
Perpustakaan Kuala Lumpur, Cawangan Sri Sabah
Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail
Perpustakaan Lembah Pantai
Perpustakaan Medan Idaman
Pustaka KL @ Keramat
More
View All
Fewer
Collapse All
Shelf Location
Include
Exclude
Cataloging
Damaged
In Process
Management and Economic
Open shelf
Reference
More
View All
Fewer
Collapse All
Publication Date
Include
Exclude
-
2002
(16)
2005
(15)
2004
(12)
2007
(9)
2006
(7)
2009
(5)
2015
(5)
2000
(4)
2008
(4)
2010
(4)
2011
(3)
2019
(3)
2021
(3)
2001
(2)
2003
(2)
2018
(2)
2012
(1)
2013
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Data protection
(15)
Computer hackers
(8)
Business enterprises -- Computer networks -- Security measures
(6)
Business enterprises - Computer networks - Security measures
(5)
Information technology -- Security measures
(5)
Microsoft Windows (Computer file)
(5)
Computer networks - Security measures
(4)
Computer crimes
(3)
Cookbooks.
(3)
Data proctection
(3)
Malware (computer software)
(3)
Operating systems (Computers)
(3)
Business -- Data processing -- Security measures
(2)
COVID-19 (Disease) -- Social aspects
(2)
Computer crimes investigation
(2)
Computer network - Security measures
(2)
Computer network -- security measures
(2)
Computer networks -- Security measures
(2)
Computer networks -- Security measures.
(2)
Computer viruses
(2)
Data protection -- Law and legislation -- Malaysia.
(2)
Internet (Computer network) - Security measures
(2)
Internet - Security measures
(2)
Linux
(2)
Privacy, Right of
(2)
Public records -- access control
(2)
Wireless communication systems -- Security measures
(2)
Archives -- Safety measures
(1)
Business networks - Computer networks - Security measures
(1)
Business- Data processing- security measures
(1)
COVID-19 (Disease) -- Economic aspects
(1)
Computer crimes -- Anecdotes
(1)
Computer crimes -- Prevention
(1)
Computer crimes -- Prevention
(1)
Computer hacker - Interviews
(1)
Computer hacker - Psychology
(1)
Computer networks
(1)
Computer networks -- Security measures
(1)
Computer networks -- Security measures
(1)
Computer secutiy equipment industry
(1)
Computer software - Testing
(1)
Computersicherheit
(1)
Confidential business information
(1)
Criminal behavior, prediction of
(1)
Cryptography
(1)
Cyberspace -- Juvenile literature
(1)
Cyberspace -- Security measures
(1)
Data encryption (Computer science)
(1)
Data recovery - computer science
(1)
Electronic commerce - Law and legislation
(1)
Electronic commerce - security measures
(1)
Electronic commerce -- Security measures
(1)
Electronic data interchange - Security measures
(1)
Electronic data processing -- Backup processing alternatives
(1)
Electronic data processing departments - Security measures
(1)
Electronic records -- Conversation and restoration
(1)
Emergency management -- Planning
(1)
Forensic sciences
(1)
Government publications -- Malaysia
(1)
Hackers
(1)
Hacking
(1)
Hardware
(1)
Information resources -- security measure
(1)
Information technology -- Security measures
(1)
Integrated circuits
(1)
Internet - Safety measures
(1)
Java (Computer program language)
(1)
Libraries -- Safety measures
(1)
Library information networks -- Security measures
(1)
Mobile Computing -- Security measures
(1)
OpenBSD (Electronic resource)
(1)
Risk assessment
(1)
Security measures
(1)
Servlets
(1)
Software protection
(1)
Solaris (Computer file)
(1)
Telecommunication -- Security measures.
(1)
Web services
(1)
Web site Design - Handbooks, Manuals, etc.
(1)
Web site design
(1)
Web sites - Security measures
(1)
Websites security measures
(1)
Wireless communication system security measures
(1)
World Wide Web security measures
(1)
More
View All
Fewer
Collapse All
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
97 Results Found
1
..
5
6
7
8
9
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
PKL
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
Solaris security
Solaris security
Gregory, Peter H.
2000
ISBN
9780130960535
Relevance:
1.0000
Available:
Select an Action
Place Hold(s)
Add to My Lists
Email
1
..
5
6
7
8
9