Search Results for Computer networks -- Security measures SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bnetworks$002b$002b--$002bSecurity$002bmeasures$0026ps$003d300? 2026-01-01T00:22:04Z Ccsp for dummies ent://SD_ILS/0/SD_ILS:282621 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Arthur, J. Deane<br/>2021&#160;2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119648376<br/> Comptia pentest certification for dummies ent://SD_ILS/0/SD_ILS:282618 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Clarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119633556<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Network Security And Cryptography : A Self-Teaching Introduction ent://SD_ILS/0/SD_ILS:264021 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Musa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781942270836<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Understanding Cyber Risk : Protecting Your Corporate Assets ent://SD_ILS/0/SD_ILS:267279 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Koehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781472477798<br/> Google Cybersecurity Expert Parisa Tabriz ent://SD_ILS/0/SD_ILS:269207 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z DiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781541500075<br/> Understanding the digital world : what you need to know about computers, the internet, privacy, and security ent://SD_ILS/0/SD_ILS:248266 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Kernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780691176543<br/> Network And Data Security For Non-Engineers ent://SD_ILS/0/SD_ILS:256440 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Groom,Frank; Groom,Kevin;&#160;Jones,Stephan author&#160;Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781498767866<br/> Security In The Private Cloud ent://SD_ILS/0/SD_ILS:256441 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Vacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781482259551<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Introduction To Certificateless Cryptography ent://SD_ILS/0/SD_ILS:255709 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Xiong, Hu&#160;Qin, Zhen, 1982- author.&#160;Vasilakos, Athanasios, author.<br/>2016<br/>ISBN&#160;9781482248609<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> Security information and event management (SIEM) implementation: ent://SD_ILS/0/SD_ILS:141299 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071701099<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengaja ent://SD_ILS/0/SD_ILS:141928 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Setiawan, Bardy Joko<br/>2011&#160;2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ Keramat<br/>ISBN&#160;9789673712922<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:95617 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Cole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780470101926<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:96237 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97136 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97896 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97854 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:98698 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> Schneier on security ent://SD_ILS/0/SD_ILS:115440 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Schneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470395356<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:116043 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470238387<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:111885 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780735625167<br/> Window Server 2008 ent://SD_ILS/0/SD_ILS:112817 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:129636 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Network security fundamentals project manual ent://SD_ILS/0/SD_ILS:95618 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Reese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470127988<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> Hardening network security ent://SD_ILS/0/SD_ILS:78754 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Mallery, John<br/>2005<br/>ISBN&#160;9780072257038<br/> The business case for network security : advocacy, governance and ROI ent://SD_ILS/0/SD_ILS:44064 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Paquet, Catherine&#160;Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201219<br/> High-tech crimes revealed : cyberwar stories from the digital front ent://SD_ILS/0/SD_ILS:44087 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Branigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321218735<br/> Internet denial of service : attack and defence mechanism ent://SD_ILS/0/SD_ILS:44360 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Mirkovic, Jelena&#160;Dietrich, Sven&#160;Dittrich, David<br/>2005&#160;2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131475731<br/> The tao of network security monitoring : beyond instrusion detection ent://SD_ILS/0/SD_ILS:45276 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Bejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321246776<br/> Network security ent://SD_ILS/0/SD_ILS:47679 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Pardoe, Terry D.&#160;Snyder, Gordon F.<br/>2005<br/>ISBN&#160;9781401882143<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Hacker V Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:131730 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Man Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Extreme exploits : advanced defenses against hardcore hacks ent://SD_ILS/0/SD_ILS:61865 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Oppleman, Victor<br/>2005<br/>ISBN&#160;9780072259551<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Linux security ent://SD_ILS/0/SD_ILS:37916 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861251554<br/> Wi-Foo ent://SD_ILS/0/SD_ILS:44280 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Vladimirov, Andrew A.&#160;Gavrilenko, Konstantin V.&#160;Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321202178<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:251286 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780072230208<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:253344 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072230208<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:21492 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Campbell, Paul&#160;Calvert, Ben&#160;Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780619120177<br/> Identity theft ent://SD_ILS/0/SD_ILS:45269 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Vacca, John R.<br/>2003<br/>ISBN&#160;9780130082756<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Internet Security ent://SD_ILS/0/SD_ILS:5604 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Schweitzer, Douglas<br/>2002<br/>ISBN&#160;9780814471425<br/> Safety net : protecting your business on the internet ent://SD_ILS/0/SD_ILS:7414 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Sindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471079620<br/> Building secure servers with Linux ent://SD_ILS/0/SD_ILS:31347 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Bauer, Michael D.<br/>2002<br/>ISBN&#160;9780596002176<br/> Data networks : routing, security and performance optimization ent://SD_ILS/0/SD_ILS:12813 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Kenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781555582715<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> The e-privacy imperative ent://SD_ILS/0/SD_ILS:15510 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Merkow, Mark S.&#160;Breithaupt, James<br/>2002<br/>ISBN&#160;9780814406281<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> IPSEC securing VPNs ent://SD_ILS/0/SD_ILS:2702 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Davis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072017571<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> Enterprise security with EJB and COBRA ent://SD_ILS/0/SD_ILS:7334 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hartman, Bret&#160;Flinn, Donald J.&#160;Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471401315<br/> Protect yourself online ent://SD_ILS/0/SD_ILS:38823 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Danda, Matthew<br/>2001<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780735611887<br/> Careers in e-commerce security and cryption ent://SD_ILS/0/SD_ILS:30011 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Hayhurst, Chris<br/>2001<br/>ISBN&#160;9780823934201<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2026-01-01T00:22:04Z 2026-01-01T00:22:04Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/>