Search Results for - Narrowed by: Computer security. SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026sm$003dtrue?dt=list 2025-07-27T18:46:17Z Hacker Techniques, Tools, And Incident Handling ent://SD_ILS/0/SD_ILS:270311 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Oriyano, Sean-Philip&#160;Solomon, Michael (Michael G.), 1963- author.<br/>2020<br/>Perpustakaan Lembah Pantai&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284147803<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data ent://SD_ILS/0/SD_ILS:253495 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Mitnick,Kevin D; Vamosi Robert&#160;Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780316380508<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Cybersecurity : engineering a secure information technology organization ent://SD_ILS/0/SD_ILS:219574 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Shoemaker, Dan, author.&#160;Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781285169903<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Cyber terrorism : policy and technical perspective ent://SD_ILS/0/SD_ILS:233551 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Shahrin Sahib&#160;Rabiah Ahmad&#160;Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Muhibbah&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670257464<br/> Future crimes ent://SD_ILS/0/SD_ILS:235883 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Goodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9780593073667<br/> Cyber security culture : counteracting cyber threats through organizational learning and training ent://SD_ILS/0/SD_ILS:202311 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Trim, Peter&#160;Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781409456940<br/> Virtualization security : protecting virtualized environments ent://SD_ILS/0/SD_ILS:207090 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Shackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118288122<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> IT governance : an international guide to data security and ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:187781 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Calder, Alan&#160;Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780749464851<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> An unprogrammed life : adventures of an incurable entrepreneur ent://SD_ILS/0/SD_ILS:179170 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Saito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118077030<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:212280 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Cherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597499477<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:183595 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Howard, Doug&#160;Prince, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470639559<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:147581 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Jang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791896<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:172467 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Krutz, Ronald L., 1938-&#160;Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470589878<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:217359 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Volonino, Linda.&#160;Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN&#160;9780470371916<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:198950 2025-07-27T18:46:17Z 2025-07-27T18:46:17Z Schneier, Bruce<br/>1996<br/>ISBN&#160;9780471117094<br/>