Limit Search Results
Format
Language
Publication Date
-
Subject
31 Results Found Subscribe to search results
000000000000PKL
Print
Cover image for Fundamentals of information system security
Kim, David
2012
Perpustakaan Kuala Lumpur
ISBN 
9780763790257
Excerpt: 
Fundamentals of information system security / Kim, David
Relevance: 
0.9927
Available:
Cover image for Radio frequency identification system security   : RFIDsec '11 Asia Workshop proceedings
RFIDsec '11 Asia (2011 : Wuxi Shi, China) Li, Tieyan
2011
Perpustakaan Kuala Lumpur
ISBN 
9781607507215
Excerpt: 
Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedings / RFIDsec
Relevance: 
0.7446
Available:
Abdul Aziz Hussin Nor' Aini Yusof Noriyanti Jahaya
2019
Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Lembah Pantai Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail
ISBN 
9789674613327
Excerpt: 
Exploring Best Practice For Home Warranty System / Abdul Aziz Hussin
Relevance: 
0.0000
Available:
Cover image for Wireless and mobile device security
Doherty, Jim, 1968-
2016
Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail
ISBN 
9781284059274
Excerpt: 
Jones & Bartlett Learning information systems security & assurance series
Relevance: 
0.0000
Available:
Cover image for Virtualization security :   protecting virtualized environments
Shackleford, Dave, author
2013
Perpustakaan Kuala Lumpur
ISBN 
9781118288122
Excerpt: 
Virtual computer systems -- Security measures
Relevance: 
0.0000
Available:
Cover image for Intelligent systems for security informatics
Yang, Christopher C.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
2013
Perpustakaan Kuala Lumpur
ISBN 
9780124047020
Excerpt: 
Intelligent systems for security informatics / Yang, Christopher C.
Relevance: 
0.0000
Available:
Cover image for Software agents, agent systems and their applications
NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin
2012
Perpustakaan Kuala Lumpur
ISBN 
9781607508175
Excerpt: 
NATO Science for Peace and Security series D: Information and communication security,
Relevance: 
0.0000
Available:
Cover image for Security and game theory : algorithms, deployed systems, lessons learned
Tambe, Milind, 1965-
"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--
2012
Perpustakaan Kuala Lumpur
ISBN 
9781107096424
Excerpt: 
Security and game theory : algorithms, deployed systems, lessons learned / Tambe, Milind, 1965-
Relevance: 
0.0000
Available:
Cover image for Electronic Access Control
Norman, Thomas L.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780123820280
Excerpt: 
Electronic - Security systems
Relevance: 
0.0000
Available:
Cover image for Food systems failure :   the global food crisis and the future of agriculture
Campbell, Hugh, 1964- Stock, Paul V.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780415712606
Excerpt: 
Food systems failure : the global food crisis and the future of agriculture / Campbell, Hugh
Relevance: 
0.0000
Available:
Cover image for iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
Hoog, Andrew Strzempka, Katie
2011
Perpustakaan Kuala Lumpur
ISBN 
9781597496599
Excerpt: 
iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and
Relevance: 
0.0000
Available:
Cover image for Security strategies in web applications and social networking
Hardwod, Mike
2011
Perpustakaan Kuala Lumpur
ISBN 
9780763791957
Excerpt: 
Jones & Bartlett learning information systems security & assurance series
Relevance: 
0.0000
Available: