Search Results for - Narrowed by: Computer security SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list 2025-08-05T17:29:38Z Cybersecurity Lessons from CoVID-19 ent://SD_ILS/0/SD_ILS:285747 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Slade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780367682699<br/> Cybersecurity in the Covid-19 pandemic ent://SD_ILS/0/SD_ILS:285748 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Okereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780367610913<br/> Information security ent://SD_ILS/0/SD_ILS:280847 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Noor Suhana Sulaiman&#160;Alsaggoff, Syed Zulkarnain Syed Idrus, author.&#160;Amiza Amir, author&#160;Wan Aniul Alyani Wan Mohamed, author.&#160;Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670922997<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Hardware Security : A Hands-On Learning Approach ent://SD_ILS/0/SD_ILS:261257 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Bhunia,Swarup<br/>2019&#160;2018<br/>ISBN&#160;9780128124772<br/> KESEDARAN KESELAMATAN SIBER ent://SD_ILS/0/SD_ILS:280915 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Masnizah Mohd&#160;Masnizah Mohd., editor.&#160;Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789674127176<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Kisah benar cyber 999 : kompilasi coretan hidup di alam siber ent://SD_ILS/0/SD_ILS:227647 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Muhibbah&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Lembah Pantai&#160;Perpustakaan Medan Idaman<br/>ISBN&#160;9789678606134<br/> Teknologi Hacking &amp; Pencegahan ent://SD_ILS/0/SD_ILS:288095 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Kurniawan, Dedik, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Izyan Khalidah Wasli, editor.&#160;Java Creativity, author.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443238<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Koleksi Lengkap SOFTWARE HACKING &amp; TEKNIK PENGHALANG ent://SD_ILS/0/SD_ILS:291216 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Kurniawan, Dedik, author.&#160;Nik Fauzi, translator.&#160;Rosnah Yassin, editor.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443245<br/> Online privacy ent://SD_ILS/0/SD_ILS:222468 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Marzolf, Julie Schwab&#160;Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781433972249<br/> Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> Handbook of eID security: concepts, practical experiences, technologies ent://SD_ILS/0/SD_ILS:141323 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Fumy, Walter<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9783895783791<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:175354 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Campagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470927533<br/> Malware analyst's cookbook and dvd ent://SD_ILS/0/SD_ILS:141408 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470613030<br/> Malware analyst's cookbook and dvd : ent://SD_ILS/0/SD_ILS:193244 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470613030<br/> Malware analyst's cookbook and dvd ent://SD_ILS/0/SD_ILS:167930 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/> Dear hacker : letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:147309 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Goldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470620069<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:124323 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Chiesa, Raoul, 1973-&#160;Ciappi, Silvio&#160;Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781420086935<br/> Teknik menggempur virus ent://SD_ILS/0/SD_ILS:131731 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Muhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789675065750<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:134361 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781439806920<br/> Teknik menggempur virus ent://SD_ILS/0/SD_ILS:188618 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Muhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak<br/>ISBN&#160;9789675065750<br/> The new school information security ent://SD_ILS/0/SD_ILS:99992 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Shostack, Adam<br/>2008<br/>ISBN&#160;9780321502780<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> Hackers' handbook 3.0 : Includes wifi, identity theft, information warfare and web 2.0 ent://SD_ILS/0/SD_ILS:124047 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z K.Dr.<br/>2008<br/>ISBN&#160;9781847321107<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Security : Computer forensics principles and practices ent://SD_ILS/0/SD_ILS:101258 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Volonino, Linda&#160;Anzaldua, Reynaldo&#160;Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131547278<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Information assurance for the enterprise : a roadmap to information security ent://SD_ILS/0/SD_ILS:89663 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Schou, Corey&#160;Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072255249<br/> Simple computer security : Disinfect your PC ent://SD_ILS/0/SD_ILS:123935 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Geier, Eric&#160;Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470068540<br/> Simple computer security : Disinfect your PC ent://SD_ILS/0/SD_ILS:124635 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Geier, Eric&#160;Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470068540<br/> Data protection and information lifecycle management ent://SD_ILS/0/SD_ILS:56110 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Petrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131927575<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:56164 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Merkow, Mark<br/>2006<br/>ISBN&#160;9780131547292<br/> Managing cybersecurity resources : a cost-benefit analysis ent://SD_ILS/0/SD_ILS:58441 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Gordon, Lawrence A.<br/>2006<br/>ISBN&#160;9780071452854<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:77678 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Fadia, Ankit.<br/>2006<br/>ISBN&#160;9781598630626<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:84360 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Stamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471738480<br/> The art of intrusion : The real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:123952 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Mitnick, Kevin D.&#160;Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471782667<br/> The ciso handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:70961 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Gentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849319525<br/> Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:52104 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Windows forensics and incident recovery ent://SD_ILS/0/SD_ILS:55283 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Carvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321200983<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> A brief history of cryptology ent://SD_ILS/0/SD_ILS:75268 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Boone, J.V.<br/>2005<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591140849<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:105563 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Windows forensics and incident recovery ent://SD_ILS/0/SD_ILS:44281 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Carvey, Harlan<br/>2005<br/>ISBN&#160;9780321200983<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:84103 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:41992 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Hoglund, Greg<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780201786958<br/> J2EE security for servlets, EJBs and web services : applying theory and standards to practice ent://SD_ILS/0/SD_ILS:43637 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Pankaj Kumar<br/>2004<br/>ISBN&#160;9780131402645<br/> Enterprise java security : building secure J2EE applications ent://SD_ILS/0/SD_ILS:43680 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Pistoia, Marco&#160;Nagaratnam, Nataraj&#160;Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321118899<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:44084 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Palmer, Brandon<br/>2004<br/>ISBN&#160;9780321193667<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:44302 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Brown, Keith<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321228352<br/> Forensic discovery ent://SD_ILS/0/SD_ILS:44361 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Farmer, Dan&#160;Venema, Wietse<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780201634976<br/> TechTV security alert : stories of real people protecting themselves from identity theft, scams and viruses ent://SD_ILS/0/SD_ILS:44502 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Worley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735713529<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:44559 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Bishop, Matt<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321247445<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:70982 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Fugini, Mariagrazia, 1957-&#160;Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591401865<br/> Inside the security mind : making the tough decisions ent://SD_ILS/0/SD_ILS:45270 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Day, Kevin<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131118294<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:50841 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2002<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:53647 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Moorhouse, Karin<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:56546 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:56664 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781577292876<br/> Writing secure code ent://SD_ILS/0/SD_ILS:5010 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Howard, Michael&#160;LeBlanc, David<br/>2002<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780735615885<br/> Wireless security models, threats and solutions ent://SD_ILS/0/SD_ILS:8603 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Nichols, Randall K.&#160;Lekkas, Panos C.<br/>2002<br/>ISBN&#160;9780071207072<br/> Confessions teenage of hanckers ent://SD_ILS/0/SD_ILS:11267 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Verton, Dan<br/>2002<br/>ISBN&#160;9780072223644<br/> CCSA next generation check point certified security administrator study guide ent://SD_ILS/0/SD_ILS:11268 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2002<br/>ISBN&#160;9780072194203<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> The secured enterprise ent://SD_ILS/0/SD_ILS:16074 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Proctor, Paul E.&#160;Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780130619068<br/> New economy equity : Navigating security and legal issues in digital business ent://SD_ILS/0/SD_ILS:18308 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Bond, Robert<br/>2002<br/>ISBN&#160;9780470843871<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:22081 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781931836500<br/> Pengenalan Kepada keselamtan komputer ent://SD_ILS/0/SD_ILS:28436 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Omar Zakaria&#160;Laila Mat Kiah<br/>2002<br/>ISBN&#160;9789839340853<br/> Privacy &amp; data protection ent://SD_ILS/0/SD_ILS:102743 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Abu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9789839088731<br/> Privacy &amp; data protection : a comprehensive analysis with special reference to the malaysian proposed law ent://SD_ILS/0/SD_ILS:110128 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Abu Bakar Munir&#160;Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789839088731<br/> Security transformation: digital defense strategies to protect your company's reputation and market share ent://SD_ILS/0/SD_ILS:1509 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z McCarthy, Mary Pat&#160;Campbell, Stuart&#160;Brownstein, Rob<br/>2001<br/>ISBN&#160;9780071379663<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> Microsoft windows 2000 security technical reference ent://SD_ILS/0/SD_ILS:1211 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z -<br/>2000<br/>ISBN&#160;9780735608580<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/> Windows 2000 security ent://SD_ILS/0/SD_ILS:6005 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z McLean, Ian<br/>2000<br/>ISBN&#160;9781576103876<br/> Solaris security ent://SD_ILS/0/SD_ILS:44585 2025-08-05T17:29:38Z 2025-08-05T17:29:38Z Gregory, Peter H.<br/>2000<br/>ISBN&#160;9780130960535<br/>