Limit Search Results
Author
Format
Language
Subject
109 Results Found Subscribe to search results
000000000000PKL
Print
Cover image for Java coding guidelines :   75 recommendations for reliable and secure programs
Long, Fred, 1947- author Mohindra, Dhruv, author Seacord, Robert C., author Sutherland, Dean F., author Svoboda, David (Software security engineer), author
2014
Perpustakaan Kuala Lumpur
ISBN 
9780321933157
Excerpt: 
Svoboda, David (Software security engineer), author
Relevance: 
0.0000
Available:
Cover image for Cyber security culture :   counteracting cyber threats through organizational learning and training
Trim, Peter Upton, David.
2013
Perpustakaan Kuala Lumpur
ISBN 
9781409456940
Excerpt: 
Computer security.
Relevance: 
0.0000
Available:
Cover image for Virtualization security :   protecting virtualized environments
Shackleford, Dave, author
2013
Perpustakaan Kuala Lumpur
ISBN 
9781118288122
Excerpt: 
Virtual computer systems -- Security measures
Relevance: 
0.0000
Available:
Cover image for Cyberspace Survival Guide :   Combating computer viruses
Shea, John M.
2013
Perpustakaan Lembah Pantai
ISBN 
9781433972126
Excerpt: 
Firewalls (Computer security) -- Juvenile literature
Relevance: 
0.0000
Available:
Cover image for Online privacy
Marzolf, Julie Schwab Shea, Therese
2013
Perpustakaan Lembah Pantai
ISBN 
9781433972249
Excerpt: 
Computer security
Relevance: 
0.0000
Available:
Cover image for Intelligent systems for security informatics
Yang, Christopher C.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
2013
Perpustakaan Kuala Lumpur
ISBN 
9780124047020
Excerpt: 
Computer networks -- Security measures.
Relevance: 
0.0000
Available:
Cover image for An unprogrammed life : adventures of an incurable entrepreneur
Saito, William H.
2012
Perpustakaan Kuala Lumpur
ISBN 
9781118077030
Excerpt: 
Computer security.
Relevance: 
0.0000
Available:
Cover image for Security metrics : a beginner's guide
Wong, Caroline
2012
Perpustakaan Kuala Lumpur
ISBN 
9780071744003
Excerpt: 
Computer security -- Evaluation.
Relevance: 
0.0000
Available:
Cover image for Web application security :  a beginner's guide
Sullivan, Bryan, 1974- Liu, Vincent
2012
Perpustakaan Kuala Lumpur Perpustakaan Jabatan
ISBN 
9780071776165
Excerpt: 
Computer networks -- Security measures.
Relevance: 
0.0000
Available:
Cover image for Securing the clicks :  network security in the age of social media
Bahadur, Gary Inasi, Jason De Carvalho, Jason
2012
Perpustakaan Kuala Lumpur
ISBN 
9780071769051
Excerpt: 
Securing the clicks : network security in the age of social media / Bahadur, Gary
Relevance: 
0.0000
Available:
Cover image for Privacy, security, and cyberspace
Plotkin, Robert, 1971-
2012
Perpustakaan Kuala Lumpur
ISBN 
9780816077564
Excerpt: 
Computer security -- Juvenile literature
Relevance: 
0.0000
Available:
Cover image for Fundamentals of information system security
Kim, David
2012
Perpustakaan Kuala Lumpur
ISBN 
9780763790257
Excerpt: 
Computer security
Relevance: 
0.0000
Available: