Search Results for - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list2025-08-05T21:42:39ZCybersecurity Lessons from CoVID-19ent://SD_ILS/0/SD_ILS:2857472025-08-05T21:42:39Z2025-08-05T21:42:39ZSlade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367682699<br/>Cybersecurity in the Covid-19 pandemicent://SD_ILS/0/SD_ILS:2857482025-08-05T21:42:39Z2025-08-05T21:42:39ZOkereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367610913<br/>Information securityent://SD_ILS/0/SD_ILS:2808472025-08-05T21:42:39Z2025-08-05T21:42:39ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-08-05T21:42:39Z2025-08-05T21:42:39ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Hardware Security : A Hands-On Learning Approachent://SD_ILS/0/SD_ILS:2612572025-08-05T21:42:39Z2025-08-05T21:42:39ZBhunia,Swarup<br/>2019 2018<br/>ISBN 9780128124772<br/>KESEDARAN KESELAMATAN SIBERent://SD_ILS/0/SD_ILS:2809152025-08-05T21:42:39Z2025-08-05T21:42:39ZMasnizah Mohd Masnizah Mohd., editor. Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674127176<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-08-05T21:42:39Z2025-08-05T21:42:39ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Kisah benar cyber 999 : kompilasi coretan hidup di alam siberent://SD_ILS/0/SD_ILS:2276472025-08-05T21:42:39Z2025-08-05T21:42:39Z2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Lembah Pantai Perpustakaan Medan Idaman<br/>ISBN 9789678606134<br/>Teknologi Hacking & Pencegahanent://SD_ILS/0/SD_ILS:2880952025-08-05T21:42:39Z2025-08-05T21:42:39ZKurniawan, Dedik, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Izyan Khalidah Wasli, editor. Java Creativity, author.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443238<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912025-08-05T21:42:39Z2025-08-05T21:42:39ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102025-08-05T21:42:39Z2025-08-05T21:42:39ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Koleksi Lengkap SOFTWARE HACKING & TEKNIK PENGHALANGent://SD_ILS/0/SD_ILS:2912162025-08-05T21:42:39Z2025-08-05T21:42:39ZKurniawan, Dedik, author. Nik Fauzi, translator. Rosnah Yassin, editor. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443245<br/>Online privacyent://SD_ILS/0/SD_ILS:2224682025-08-05T21:42:39Z2025-08-05T21:42:39ZMarzolf, Julie Schwab Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972249<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-08-05T21:42:39Z2025-08-05T21:42:39ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-08-05T21:42:39Z2025-08-05T21:42:39ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>Handbook of eID security: concepts, practical experiences, technologiesent://SD_ILS/0/SD_ILS:1413232025-08-05T21:42:39Z2025-08-05T21:42:39ZFumy, Walter<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9783895783791<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-08-05T21:42:39Z2025-08-05T21:42:39ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1414082025-08-05T21:42:39Z2025-08-05T21:42:39ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvd :ent://SD_ILS/0/SD_ILS:1932442025-08-05T21:42:39Z2025-08-05T21:42:39ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1679302025-08-05T21:42:39Z2025-08-05T21:42:39ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>Dear hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:1473092025-08-05T21:42:39Z2025-08-05T21:42:39ZGoldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470620069<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-08-05T21:42:39Z2025-08-05T21:42:39ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:1243232025-08-05T21:42:39Z2025-08-05T21:42:39ZChiesa, Raoul, 1973- Ciappi, Silvio Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781420086935<br/>Teknik menggempur virusent://SD_ILS/0/SD_ILS:1317312025-08-05T21:42:39Z2025-08-05T21:42:39ZMuhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789675065750<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-08-05T21:42:39Z2025-08-05T21:42:39Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Teknik menggempur virusent://SD_ILS/0/SD_ILS:1886182025-08-05T21:42:39Z2025-08-05T21:42:39ZMuhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak<br/>ISBN 9789675065750<br/>The new school information securityent://SD_ILS/0/SD_ILS:999922025-08-05T21:42:39Z2025-08-05T21:42:39ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-08-05T21:42:39Z2025-08-05T21:42:39ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>Hackers' handbook 3.0 : Includes wifi, identity theft, information warfare and web 2.0ent://SD_ILS/0/SD_ILS:1240472025-08-05T21:42:39Z2025-08-05T21:42:39ZK.Dr.<br/>2008<br/>ISBN 9781847321107<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-08-05T21:42:39Z2025-08-05T21:42:39ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-08-05T21:42:39Z2025-08-05T21:42:39ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-08-05T21:42:39Z2025-08-05T21:42:39ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-08-05T21:42:39Z2025-08-05T21:42:39ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Security : Computer forensics principles and practicesent://SD_ILS/0/SD_ILS:1012582025-08-05T21:42:39Z2025-08-05T21:42:39ZVolonino, Linda Anzaldua, Reynaldo Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131547278<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-08-05T21:42:39Z2025-08-05T21:42:39ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-08-05T21:42:39Z2025-08-05T21:42:39ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632025-08-05T21:42:39Z2025-08-05T21:42:39ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352025-08-05T21:42:39Z2025-08-05T21:42:39ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352025-08-05T21:42:39Z2025-08-05T21:42:39ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Data protection and information lifecycle managementent://SD_ILS/0/SD_ILS:561102025-08-05T21:42:39Z2025-08-05T21:42:39ZPetrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131927575<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:561642025-08-05T21:42:39Z2025-08-05T21:42:39ZMerkow, Mark<br/>2006<br/>ISBN 9780131547292<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-08-05T21:42:39Z2025-08-05T21:42:39ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:776782025-08-05T21:42:39Z2025-08-05T21:42:39ZFadia, Ankit.<br/>2006<br/>ISBN 9781598630626<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:843602025-08-05T21:42:39Z2025-08-05T21:42:39ZStamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471738480<br/>The art of intrusion : The real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:1239522025-08-05T21:42:39Z2025-08-05T21:42:39ZMitnick, Kevin D. Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471782667<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-08-05T21:42:39Z2025-08-05T21:42:39ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042025-08-05T21:42:39Z2025-08-05T21:42:39Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-08-05T21:42:39Z2025-08-05T21:42:39ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:552832025-08-05T21:42:39Z2025-08-05T21:42:39ZCarvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321200983<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972025-08-05T21:42:39Z2025-08-05T21:42:39Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-08-05T21:42:39Z2025-08-05T21:42:39ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-08-05T21:42:39Z2025-08-05T21:42:39ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372025-08-05T21:42:39Z2025-08-05T21:42:39ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332025-08-05T21:42:39Z2025-08-05T21:42:39ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-08-05T21:42:39Z2025-08-05T21:42:39ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-08-05T21:42:39Z2025-08-05T21:42:39ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:442812025-08-05T21:42:39Z2025-08-05T21:42:39ZCarvey, Harlan<br/>2005<br/>ISBN 9780321200983<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822025-08-05T21:42:39Z2025-08-05T21:42:39ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-08-05T21:42:39Z2025-08-05T21:42:39ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-08-05T21:42:39Z2025-08-05T21:42:39ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-08-05T21:42:39Z2025-08-05T21:42:39ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:419922025-08-05T21:42:39Z2025-08-05T21:42:39ZHoglund, Greg<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201786958<br/>J2EE security for servlets, EJBs and web services : applying theory and standards to practiceent://SD_ILS/0/SD_ILS:436372025-08-05T21:42:39Z2025-08-05T21:42:39ZPankaj Kumar<br/>2004<br/>ISBN 9780131402645<br/>Enterprise java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:436802025-08-05T21:42:39Z2025-08-05T21:42:39ZPistoia, Marco Nagaratnam, Nataraj Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321118899<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:440842025-08-05T21:42:39Z2025-08-05T21:42:39ZPalmer, Brandon<br/>2004<br/>ISBN 9780321193667<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:443022025-08-05T21:42:39Z2025-08-05T21:42:39ZBrown, Keith<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321228352<br/>Forensic discoveryent://SD_ILS/0/SD_ILS:443612025-08-05T21:42:39Z2025-08-05T21:42:39ZFarmer, Dan Venema, Wietse<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201634976<br/>TechTV security alert : stories of real people protecting themselves from identity theft, scams and virusesent://SD_ILS/0/SD_ILS:445022025-08-05T21:42:39Z2025-08-05T21:42:39ZWorley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735713529<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:445592025-08-05T21:42:39Z2025-08-05T21:42:39ZBishop, Matt<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321247445<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862025-08-05T21:42:39Z2025-08-05T21:42:39ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-08-05T21:42:39Z2025-08-05T21:42:39ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-08-05T21:42:39Z2025-08-05T21:42:39ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-08-05T21:42:39Z2025-08-05T21:42:39ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Inside the security mind : making the tough decisionsent://SD_ILS/0/SD_ILS:452702025-08-05T21:42:39Z2025-08-05T21:42:39ZDay, Kevin<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131118294<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-08-05T21:42:39Z2025-08-05T21:42:39ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:508412025-08-05T21:42:39Z2025-08-05T21:42:39Z2002<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:536472025-08-05T21:42:39Z2025-08-05T21:42:39ZMoorhouse, Karin<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:565462025-08-05T21:42:39Z2025-08-05T21:42:39Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:566642025-08-05T21:42:39Z2025-08-05T21:42:39Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Writing secure codeent://SD_ILS/0/SD_ILS:50102025-08-05T21:42:39Z2025-08-05T21:42:39ZHoward, Michael LeBlanc, David<br/>2002<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780735615885<br/>Wireless security models, threats and solutionsent://SD_ILS/0/SD_ILS:86032025-08-05T21:42:39Z2025-08-05T21:42:39ZNichols, Randall K. Lekkas, Panos C.<br/>2002<br/>ISBN 9780071207072<br/>Confessions teenage of hanckersent://SD_ILS/0/SD_ILS:112672025-08-05T21:42:39Z2025-08-05T21:42:39ZVerton, Dan<br/>2002<br/>ISBN 9780072223644<br/>CCSA next generation check point certified security administrator study guideent://SD_ILS/0/SD_ILS:112682025-08-05T21:42:39Z2025-08-05T21:42:39Z2002<br/>ISBN 9780072194203<br/>Computer forensicsent://SD_ILS/0/SD_ILS:137602025-08-05T21:42:39Z2025-08-05T21:42:39ZKruse II, Warren G. Heiser, Jay G.<br/>2002<br/>ISBN 9780201707199<br/>The secured enterpriseent://SD_ILS/0/SD_ILS:160742025-08-05T21:42:39Z2025-08-05T21:42:39ZProctor, Paul E. Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780130619068<br/>New economy equity : Navigating security and legal issues in digital businessent://SD_ILS/0/SD_ILS:183082025-08-05T21:42:39Z2025-08-05T21:42:39ZBond, Robert<br/>2002<br/>ISBN 9780470843871<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-08-05T21:42:39Z2025-08-05T21:42:39ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:220812025-08-05T21:42:39Z2025-08-05T21:42:39Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781931836500<br/>Pengenalan Kepada keselamtan komputerent://SD_ILS/0/SD_ILS:284362025-08-05T21:42:39Z2025-08-05T21:42:39ZOmar Zakaria Laila Mat Kiah<br/>2002<br/>ISBN 9789839340853<br/>Privacy & data protectionent://SD_ILS/0/SD_ILS:1027432025-08-05T21:42:39Z2025-08-05T21:42:39ZAbu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9789839088731<br/>Privacy & data protection : a comprehensive analysis with special reference to the malaysian proposed lawent://SD_ILS/0/SD_ILS:1101282025-08-05T21:42:39Z2025-08-05T21:42:39ZAbu Bakar Munir Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789839088731<br/>Security transformation: digital defense strategies to protect your company's reputation and market shareent://SD_ILS/0/SD_ILS:15092025-08-05T21:42:39Z2025-08-05T21:42:39ZMcCarthy, Mary Pat Campbell, Stuart Brownstein, Rob<br/>2001<br/>ISBN 9780071379663<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552025-08-05T21:42:39Z2025-08-05T21:42:39ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>Microsoft windows 2000 security technical referenceent://SD_ILS/0/SD_ILS:12112025-08-05T21:42:39Z2025-08-05T21:42:39Z-<br/>2000<br/>ISBN 9780735608580<br/>The complete guide to security internetent://SD_ILS/0/SD_ILS:14302025-08-05T21:42:39Z2025-08-05T21:42:39ZMerkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780814470701<br/>Windows 2000 securityent://SD_ILS/0/SD_ILS:60052025-08-05T21:42:39Z2025-08-05T21:42:39ZMcLean, Ian<br/>2000<br/>ISBN 9781576103876<br/>Solaris securityent://SD_ILS/0/SD_ILS:445852025-08-05T21:42:39Z2025-08-05T21:42:39ZGregory, Peter H.<br/>2000<br/>ISBN 9780130960535<br/>