Search Results for Computer networks - Security measures SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bnetworks$002b-$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300? 2025-11-05T09:13:36Z Ccsp for dummies ent://SD_ILS/0/SD_ILS:282621 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Arthur, J. Deane<br/>2021&#160;2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119648376<br/> Comptia pentest certification for dummies ent://SD_ILS/0/SD_ILS:282618 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Clarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119633556<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Network Security And Cryptography : A Self-Teaching Introduction ent://SD_ILS/0/SD_ILS:264021 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Musa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781942270836<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Understanding Cyber Risk : Protecting Your Corporate Assets ent://SD_ILS/0/SD_ILS:267279 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Koehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781472477798<br/> Google Cybersecurity Expert Parisa Tabriz ent://SD_ILS/0/SD_ILS:269207 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z DiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781541500075<br/> Understanding the digital world : what you need to know about computers, the internet, privacy, and security ent://SD_ILS/0/SD_ILS:248266 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Kernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780691176543<br/> Network And Data Security For Non-Engineers ent://SD_ILS/0/SD_ILS:256440 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Groom,Frank; Groom,Kevin;&#160;Jones,Stephan author&#160;Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781498767866<br/> Security In The Private Cloud ent://SD_ILS/0/SD_ILS:256441 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Vacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781482259551<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Introduction To Certificateless Cryptography ent://SD_ILS/0/SD_ILS:255709 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Xiong, Hu&#160;Qin, Zhen, 1982- author.&#160;Vasilakos, Athanasios, author.<br/>2016<br/>ISBN&#160;9781482248609<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> Security information and event management (SIEM) implementation: ent://SD_ILS/0/SD_ILS:141299 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071701099<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengaja ent://SD_ILS/0/SD_ILS:141928 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Setiawan, Bardy Joko<br/>2011&#160;2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ Keramat<br/>ISBN&#160;9789673712922<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:95617 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Cole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780470101926<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:96237 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97136 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97896 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97854 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:98698 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> Schneier on security ent://SD_ILS/0/SD_ILS:115440 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Schneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470395356<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:116043 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470238387<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:111885 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780735625167<br/> Window Server 2008 ent://SD_ILS/0/SD_ILS:112817 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:129636 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Network security fundamentals project manual ent://SD_ILS/0/SD_ILS:95618 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Reese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470127988<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> Hardening network security ent://SD_ILS/0/SD_ILS:78754 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Mallery, John<br/>2005<br/>ISBN&#160;9780072257038<br/> The business case for network security : advocacy, governance and ROI ent://SD_ILS/0/SD_ILS:44064 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Paquet, Catherine&#160;Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201219<br/> High-tech crimes revealed : cyberwar stories from the digital front ent://SD_ILS/0/SD_ILS:44087 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Branigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321218735<br/> Internet denial of service : attack and defence mechanism ent://SD_ILS/0/SD_ILS:44360 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Mirkovic, Jelena&#160;Dietrich, Sven&#160;Dittrich, David<br/>2005&#160;2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131475731<br/> The tao of network security monitoring : beyond instrusion detection ent://SD_ILS/0/SD_ILS:45276 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Bejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321246776<br/> Network security ent://SD_ILS/0/SD_ILS:47679 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Pardoe, Terry D.&#160;Snyder, Gordon F.<br/>2005<br/>ISBN&#160;9781401882143<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Hacker V Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:131730 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Man Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Extreme exploits : advanced defenses against hardcore hacks ent://SD_ILS/0/SD_ILS:61865 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Oppleman, Victor<br/>2005<br/>ISBN&#160;9780072259551<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Linux security ent://SD_ILS/0/SD_ILS:37916 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861251554<br/> Wi-Foo ent://SD_ILS/0/SD_ILS:44280 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Vladimirov, Andrew A.&#160;Gavrilenko, Konstantin V.&#160;Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321202178<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:251286 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780072230208<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:253344 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072230208<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:21492 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Campbell, Paul&#160;Calvert, Ben&#160;Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780619120177<br/> Identity theft ent://SD_ILS/0/SD_ILS:45269 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Vacca, John R.<br/>2003<br/>ISBN&#160;9780130082756<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Internet Security ent://SD_ILS/0/SD_ILS:5604 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Schweitzer, Douglas<br/>2002<br/>ISBN&#160;9780814471425<br/> Safety net : protecting your business on the internet ent://SD_ILS/0/SD_ILS:7414 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Sindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471079620<br/> Building secure servers with Linux ent://SD_ILS/0/SD_ILS:31347 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Bauer, Michael D.<br/>2002<br/>ISBN&#160;9780596002176<br/> Data networks : routing, security and performance optimization ent://SD_ILS/0/SD_ILS:12813 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Kenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781555582715<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> The e-privacy imperative ent://SD_ILS/0/SD_ILS:15510 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Merkow, Mark S.&#160;Breithaupt, James<br/>2002<br/>ISBN&#160;9780814406281<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> IPSEC securing VPNs ent://SD_ILS/0/SD_ILS:2702 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Davis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072017571<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> Enterprise security with EJB and COBRA ent://SD_ILS/0/SD_ILS:7334 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hartman, Bret&#160;Flinn, Donald J.&#160;Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471401315<br/> Protect yourself online ent://SD_ILS/0/SD_ILS:38823 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Danda, Matthew<br/>2001<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780735611887<br/> Careers in e-commerce security and cryption ent://SD_ILS/0/SD_ILS:30011 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Hayhurst, Chris<br/>2001<br/>ISBN&#160;9780823934201<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2025-11-05T09:13:36Z 2025-11-05T09:13:36Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/>