Search Results for Computer Networks - Narrowed by: Computer security SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bNetworks$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300? 2025-10-05T06:37:56Z The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2025-10-05T06:37:56Z 2025-10-05T06:37:56Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/>