Limit Search Results
Format
Language
Subject
38 Results Found Subscribe to search results
000000000000PKL
Print
Cover image for Computer networks : a systems approach
Peterson, Larry L. Davie, Bruce S.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780123850591
Excerpt: 
Computer networks : a systems approach / Peterson, Larry L.
Relevance: 
0.9926
Available:
Cover image for Windows 8 for dummies elearning kit for dummies
Wempen, Faith
2013 2012 4 3
Perpustakaan Kuala Lumpur
ISBN 
9781118202876
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available:
Cover image for Windows 8 for dummies elearning kit for dummies :
Wempen, Faith
2013 2012
Perpustakaan Kuala Lumpur
ISBN 
9781118202876
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available:
Cover image for Getting started with Microsoft Outlook 2010
Kinser, Amy Stover, Barbara
2012
Perpustakaan Kuala Lumpur
ISBN 
9780132675468
Excerpt: 
Electronic mail systems -- Computer programs
Relevance: 
0.0000
Available:
Cover image for Getting started with Windows 7
Kinser, Amy Federico, Hilda
2012
Perpustakaan Kuala Lumpur
ISBN 
9780132675475
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available:
Cover image for Modern diesel technology :   light duty diesels
Bennett, Sean.
2012
ISBN 
9781435480476
Excerpt: 
Trucks -- Motors -- Computer control systems.
Relevance: 
0.0000
Available:
Cover image for Software agents, agent systems and their applications
NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin
2012
Perpustakaan Kuala Lumpur
ISBN 
9781607508175
Excerpt: 
Software agents, agent systems and their applications / NATO Advanced Study Institute on Software
Relevance: 
0.0000
Available:
Cover image for Security and game theory : algorithms, deployed systems, lessons learned
Tambe, Milind, 1965-
"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--
2012
Perpustakaan Kuala Lumpur
ISBN 
9781107096424
Excerpt: 
Security and game theory : algorithms, deployed systems, lessons learned / Tambe, Milind, 1965-
Relevance: 
0.0000
Available:
Cover image for Microsoft Windows operating system :   essentials
Carpentar, Tom
2012
Perpustakaan Kuala Lumpur
ISBN 
9781118195529
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available:
Cover image for Fundamentals of information system security
Kim, David
2012
Perpustakaan Kuala Lumpur
ISBN 
9780763790257
Excerpt: 
Fundamentals of information system security / Kim, David
Relevance: 
0.0000
Available:
Cover image for A practical guide to Fedora and Red Hat Enterprise Linux
Sobel, Mark G.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780132757270
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available:
Cover image for A practical guide to Fedora and Red Hat Enterprise Linux
Sobel, Mark G.
2012
Perpustakaan Kuala Lumpur
ISBN 
9780132757270
Excerpt: 
Operating systems (Computers)
Relevance: 
0.0000
Available: