Limit Search Results
Format
Language
Publication Date
-
Subject
34 Results Found Subscribe to search results
0000000000PKL
Print
Kumara Velu, 1961- author.
2016
Pustaka KL @ Keramat
ISBN 
9789670492681
Excerpt: 
Cyber Smart Series
Relevance: 
0.0744
Available:
Kumara Velu, 1961- author.
2016
Pustaka KL @ Keramat
ISBN 
9789670492681
Excerpt: 
Cyber Smart Series
Relevance: 
0.0744
Available:
Kumara Velu, 1961- author.
2016
Pustaka KL @ Keramat
ISBN 
9789670492681
Excerpt: 
Cyber Smart Series
Relevance: 
0.0744
Available:
Kumara Velu, 1961- author.
2016
Pustaka KL @ Keramat
ISBN 
9789670492681
Excerpt: 
Cyber Smart Series
Relevance: 
0.0744
Available:
Kumara Velu, 1961- author.
2016
Pustaka KL @ Keramat
ISBN 
9789670492681
Excerpt: 
Cyber Smart Series
Relevance: 
0.0744
Available:
Cover image for Threat vector
Clancy, Tom, 1947- Greaney, Mark.
Jack Ryan has only just moved back into the Oval Office when he is faced with a new international threat. An aborted coup in the People's Republic of China has left President Wei Zhen Lin with no choice but to agree with the expansionist policies of General Su Ke Quiang. They have declared the South China Sea a protectorate and are planning an invasion of Taiwan. The Ryan administration is determined to thwart these Chinese ambitions, but the stakes are dangerously high as hundreds of Chinese anti-ship missiles thwart the US Navy's plans to protect the island. Meanwhile, Chinese cyber warfare experts have launched a devastating attack on American infrastructure. It's a new combat arena, but it's every bit as deadly as any that has gone before. Jack Ryan, Jr. and his colleagues at the Campus may be just the wild card that his father needs to stack the deck. There's just one problem: someone knows about the off-the-books intelligence agency and may be ready to blow their cover sky high.
2502 2012
Perpustakaan Kuala Lumpur
ISBN 
9780718176945
Excerpt: 
-ship missiles thwart the US Navy's plans to protect the island. Meanwhile, Chinese cyber warfare experts have
Relevance: 
0.0000
Available:
Cover image for Intelligent systems for security informatics
Yang, Christopher C.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
2013
Perpustakaan Kuala Lumpur
ISBN 
9780124047020
Excerpt: 
, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation
Relevance: 
0.0000
Available:
Cover image for The impact of technology on relationships in educational settings
Costabile, Angela Spears, Barbara A.
"As the linguistic, cognitive and social elements of our lives are transformed by new and emerging technologies, educational settings are also challenged to respond to the issues that have arisen as a consequence. This book focuses on that challenge: using psychological theory as a lens to highlight the positive uses of new technologies in relationships and educational settings, and to advocate technological learning opportunities and social support where the misuse and abuse of ICT occurs. The Impact of Technology on Relationships in Educational Settings sets out to explore the role of ICTs in relationship forming, social networking and social relationships within our schools and has grown out of the European Cooperation in Science and Technology (COST); Action on cyberbullying, involving 28 participating countries, and two non-COST countries, of which Australia is one. This cutting edge international text offers cross-cultural, psychological perspectives on the positive uses of new and emerging technologies to improve social relationships and examples of best practice to prevent virtual bullying. This comes at a time when much of the focus in current writings has been on the more negative aspects which have emerged as new technologies evolved: cyberbullying, cyber-aggression and cybersafety concerns. This text is ideally suited to researchers and practiitioners in the fields of Educational and developmental psychology, as well as those specialising in educational technology and the sociology of education"-- Provided by publisher.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780415610087
Excerpt: 
emerged as new technologies evolved: cyberbullying, cyber-aggression and cybersafety concerns. This text
Relevance: 
0.0000
Available:
Cover image for The Internet book of life :   use the Web to grow richer, smarter, healthier, and happier
McDermott, Irene E., 1959-
2011
Perpustakaan Kuala Lumpur
ISBN 
9780910965897
Excerpt: 
Cyber Age Books,
Relevance: 
0.0000
Available:
Cover image for Cybercrime
Ross, Jeffrey Ian.
2010
Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail
ISBN 
9780791094068
Excerpt: 
What is cybercrime? -- Hacking and malware -- Cyber theft and illegal goods -- Identity theft and
Relevance: 
0.0000
Available: