Search Results for Computer Networks - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bNetworks$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?2025-10-05T06:37:56ZThe Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-10-05T06:37:56Z2025-10-05T06:37:56ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-10-05T06:37:56Z2025-10-05T06:37:56ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912025-10-05T06:37:56Z2025-10-05T06:37:56ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102025-10-05T06:37:56Z2025-10-05T06:37:56ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-10-05T06:37:56Z2025-10-05T06:37:56ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-10-05T06:37:56Z2025-10-05T06:37:56ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-10-05T06:37:56Z2025-10-05T06:37:56ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-10-05T06:37:56Z2025-10-05T06:37:56ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-10-05T06:37:56Z2025-10-05T06:37:56ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-10-05T06:37:56Z2025-10-05T06:37:56ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-10-05T06:37:56Z2025-10-05T06:37:56ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-10-05T06:37:56Z2025-10-05T06:37:56ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-10-05T06:37:56Z2025-10-05T06:37:56ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-10-05T06:37:56Z2025-10-05T06:37:56ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972025-10-05T06:37:56Z2025-10-05T06:37:56Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-10-05T06:37:56Z2025-10-05T06:37:56ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-10-05T06:37:56Z2025-10-05T06:37:56ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372025-10-05T06:37:56Z2025-10-05T06:37:56ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332025-10-05T06:37:56Z2025-10-05T06:37:56ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822025-10-05T06:37:56Z2025-10-05T06:37:56ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-10-05T06:37:56Z2025-10-05T06:37:56ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-10-05T06:37:56Z2025-10-05T06:37:56ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862025-10-05T06:37:56Z2025-10-05T06:37:56ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-10-05T06:37:56Z2025-10-05T06:37:56ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-10-05T06:37:56Z2025-10-05T06:37:56ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-10-05T06:37:56Z2025-10-05T06:37:56ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Computer forensicsent://SD_ILS/0/SD_ILS:137602025-10-05T06:37:56Z2025-10-05T06:37:56ZKruse II, Warren G. Heiser, Jay G.<br/>2002<br/>ISBN 9780201707199<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-10-05T06:37:56Z2025-10-05T06:37:56ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552025-10-05T06:37:56Z2025-10-05T06:37:56ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>The complete guide to security internetent://SD_ILS/0/SD_ILS:14302025-10-05T06:37:56Z2025-10-05T06:37:56ZMerkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780814470701<br/>