Search Results for Computer networks- security measure SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bnetworks-$002bsecurity$002bmeasure$0026ic$003dtrue$0026ps$003d300? 2026-01-01T07:44:20Z Ccsp for dummies ent://SD_ILS/0/SD_ILS:282621 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Arthur, J. Deane<br/>2021&#160;2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119648376<br/> Comptia pentest certification for dummies ent://SD_ILS/0/SD_ILS:282618 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Clarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119633556<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Network Security And Cryptography : A Self-Teaching Introduction ent://SD_ILS/0/SD_ILS:264021 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Musa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781942270836<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Understanding Cyber Risk : Protecting Your Corporate Assets ent://SD_ILS/0/SD_ILS:267279 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Koehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781472477798<br/> Google Cybersecurity Expert Parisa Tabriz ent://SD_ILS/0/SD_ILS:269207 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z DiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781541500075<br/> Understanding the digital world : what you need to know about computers, the internet, privacy, and security ent://SD_ILS/0/SD_ILS:248266 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Kernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780691176543<br/> Network And Data Security For Non-Engineers ent://SD_ILS/0/SD_ILS:256440 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Groom,Frank; Groom,Kevin;&#160;Jones,Stephan author&#160;Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781498767866<br/> Security In The Private Cloud ent://SD_ILS/0/SD_ILS:256441 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Vacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781482259551<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Introduction To Certificateless Cryptography ent://SD_ILS/0/SD_ILS:255709 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Xiong, Hu&#160;Qin, Zhen, 1982- author.&#160;Vasilakos, Athanasios, author.<br/>2016<br/>ISBN&#160;9781482248609<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> Security information and event management (SIEM) implementation: ent://SD_ILS/0/SD_ILS:141299 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071701099<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengaja ent://SD_ILS/0/SD_ILS:141928 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Setiawan, Bardy Joko<br/>2011&#160;2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ Keramat<br/>ISBN&#160;9789673712922<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:95617 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Cole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780470101926<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:96237 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97136 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97896 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97854 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:98698 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> Schneier on security ent://SD_ILS/0/SD_ILS:115440 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Schneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470395356<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:116043 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470238387<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:111885 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780735625167<br/> Window Server 2008 ent://SD_ILS/0/SD_ILS:112817 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:129636 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Network security fundamentals project manual ent://SD_ILS/0/SD_ILS:95618 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Reese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470127988<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> Hardening network security ent://SD_ILS/0/SD_ILS:78754 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Mallery, John<br/>2005<br/>ISBN&#160;9780072257038<br/> The business case for network security : advocacy, governance and ROI ent://SD_ILS/0/SD_ILS:44064 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Paquet, Catherine&#160;Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201219<br/> High-tech crimes revealed : cyberwar stories from the digital front ent://SD_ILS/0/SD_ILS:44087 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Branigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321218735<br/> Internet denial of service : attack and defence mechanism ent://SD_ILS/0/SD_ILS:44360 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Mirkovic, Jelena&#160;Dietrich, Sven&#160;Dittrich, David<br/>2005&#160;2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131475731<br/> The tao of network security monitoring : beyond instrusion detection ent://SD_ILS/0/SD_ILS:45276 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Bejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321246776<br/> Network security ent://SD_ILS/0/SD_ILS:47679 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Pardoe, Terry D.&#160;Snyder, Gordon F.<br/>2005<br/>ISBN&#160;9781401882143<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Hacker V Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:131730 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Man Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Extreme exploits : advanced defenses against hardcore hacks ent://SD_ILS/0/SD_ILS:61865 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Oppleman, Victor<br/>2005<br/>ISBN&#160;9780072259551<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Linux security ent://SD_ILS/0/SD_ILS:37916 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861251554<br/> Wi-Foo ent://SD_ILS/0/SD_ILS:44280 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Vladimirov, Andrew A.&#160;Gavrilenko, Konstantin V.&#160;Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321202178<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:251286 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780072230208<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:253344 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072230208<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:21492 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Campbell, Paul&#160;Calvert, Ben&#160;Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780619120177<br/> Identity theft ent://SD_ILS/0/SD_ILS:45269 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Vacca, John R.<br/>2003<br/>ISBN&#160;9780130082756<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Internet Security ent://SD_ILS/0/SD_ILS:5604 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Schweitzer, Douglas<br/>2002<br/>ISBN&#160;9780814471425<br/> Safety net : protecting your business on the internet ent://SD_ILS/0/SD_ILS:7414 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Sindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471079620<br/> Building secure servers with Linux ent://SD_ILS/0/SD_ILS:31347 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Bauer, Michael D.<br/>2002<br/>ISBN&#160;9780596002176<br/> Data networks : routing, security and performance optimization ent://SD_ILS/0/SD_ILS:12813 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Kenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781555582715<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> The e-privacy imperative ent://SD_ILS/0/SD_ILS:15510 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Merkow, Mark S.&#160;Breithaupt, James<br/>2002<br/>ISBN&#160;9780814406281<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> IPSEC securing VPNs ent://SD_ILS/0/SD_ILS:2702 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Davis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072017571<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> Enterprise security with EJB and COBRA ent://SD_ILS/0/SD_ILS:7334 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hartman, Bret&#160;Flinn, Donald J.&#160;Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471401315<br/> Careers in e-commerce security and cryption ent://SD_ILS/0/SD_ILS:30011 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Hayhurst, Chris<br/>2001<br/>ISBN&#160;9780823934201<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2026-01-01T07:44:20Z 2026-01-01T07:44:20Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/>