Search Results for Computer - Narrowed by: Data protectionSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300?dt=list2026-01-27T03:57:52ZSimple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352026-01-27T03:57:52Z2026-01-27T03:57:52ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352026-01-27T03:57:52Z2026-01-27T03:57:52ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Information securityent://SD_ILS/0/SD_ILS:2808472026-01-27T03:57:52Z2026-01-27T03:57:52ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302026-01-27T03:57:52Z2026-01-27T03:57:52ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792026-01-27T03:57:52Z2026-01-27T03:57:52ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952026-01-27T03:57:52Z2026-01-27T03:57:52ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412026-01-27T03:57:52Z2026-01-27T03:57:52ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612026-01-27T03:57:52Z2026-01-27T03:57:52Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222026-01-27T03:57:52Z2026-01-27T03:57:52ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112026-01-27T03:57:52Z2026-01-27T03:57:52ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632026-01-27T03:57:52Z2026-01-27T03:57:52ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Data protection and information lifecycle managementent://SD_ILS/0/SD_ILS:561102026-01-27T03:57:52Z2026-01-27T03:57:52ZPetrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131927575<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412026-01-27T03:57:52Z2026-01-27T03:57:52ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612026-01-27T03:57:52Z2026-01-27T03:57:52ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042026-01-27T03:57:52Z2026-01-27T03:57:52ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112026-01-27T03:57:52Z2026-01-27T03:57:52ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2512862026-01-27T03:57:52Z2026-01-27T03:57:52ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780072230208<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442026-01-27T03:57:52Z2026-01-27T03:57:52ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Disaster Recovering Planning : Preparing for the Unthinkableent://SD_ILS/0/SD_ILS:229692026-01-27T03:57:52Z2026-01-27T03:57:52ZToigo, Jon William<br/>2003<br/>ISBN 9780130462824<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502026-01-27T03:57:52Z2026-01-27T03:57:52ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>The secured enterpriseent://SD_ILS/0/SD_ILS:160742026-01-27T03:57:52Z2026-01-27T03:57:52ZProctor, Paul E. Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780130619068<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552026-01-27T03:57:52Z2026-01-27T03:57:52ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>