Search Results for - Narrowed by: Computer security.SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026sm$003dtrue?dt=list2025-07-27T18:46:17ZHacker Techniques, Tools, And Incident Handlingent://SD_ILS/0/SD_ILS:2703112025-07-27T18:46:17Z2025-07-27T18:46:17ZOriyano, Sean-Philip Solomon, Michael (Michael G.), 1963- author.<br/>2020<br/>Perpustakaan Lembah Pantai Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284147803<br/>Management Of Information Securityent://SD_ILS/0/SD_ILS:2612542025-07-27T18:46:17Z2025-07-27T18:46:17ZWhitman, Michael E., Mattford, Herbert J., author.<br/>2019<br/>ISBN 9781337405713<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-07-27T18:46:17Z2025-07-27T18:46:17ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-07-27T18:46:17Z2025-07-27T18:46:17ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-07-27T18:46:17Z2025-07-27T18:46:17ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-07-27T18:46:17Z2025-07-27T18:46:17ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:2195742025-07-27T18:46:17Z2025-07-27T18:46:17ZShoemaker, Dan, author. Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781285169903<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:2304002025-07-27T18:46:17Z2025-07-27T18:46:17ZSchneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119092438<br/>Cyber terrorism : policy and technical perspectiveent://SD_ILS/0/SD_ILS:2335512025-07-27T18:46:17Z2025-07-27T18:46:17ZShahrin Sahib Rabiah Ahmad Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670257464<br/>Future crimesent://SD_ILS/0/SD_ILS:2358832025-07-27T18:46:17Z2025-07-27T18:46:17ZGoodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN 9780593073667<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-07-27T18:46:17Z2025-07-27T18:46:17ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-07-27T18:46:17Z2025-07-27T18:46:17ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-07-27T18:46:17Z2025-07-27T18:46:17ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>IT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:1877812025-07-27T18:46:17Z2025-07-27T18:46:17ZCalder, Alan Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780749464851<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-07-27T18:46:17Z2025-07-27T18:46:17ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>An unprogrammed life : adventures of an incurable entrepreneurent://SD_ILS/0/SD_ILS:1791702025-07-27T18:46:17Z2025-07-27T18:46:17ZSaito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118077030<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-07-27T18:46:17Z2025-07-27T18:46:17ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-07-27T18:46:17Z2025-07-27T18:46:17ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-07-27T18:46:17Z2025-07-27T18:46:17ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:1835952025-07-27T18:46:17Z2025-07-27T18:46:17ZHoward, Doug Prince, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470639559<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-07-27T18:46:17Z2025-07-27T18:46:17ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-07-27T18:46:17Z2025-07-27T18:46:17ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:1724672025-07-27T18:46:17Z2025-07-27T18:46:17ZKrutz, Ronald L., 1938- Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470589878<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-07-27T18:46:17Z2025-07-27T18:46:17ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-07-27T18:46:17Z2025-07-27T18:46:17ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:2173592025-07-27T18:46:17Z2025-07-27T18:46:17ZVolonino, Linda. Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN 9780470371916<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1989502025-07-27T18:46:17Z2025-07-27T18:46:17ZSchneier, Bruce<br/>1996<br/>ISBN 9780471117094<br/>