Search Results for Computer networks- security measure - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bnetworks-$002bsecurity$002bmeasure$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?2026-01-01T00:06:22ZThe Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882026-01-01T00:06:22Z2026-01-01T00:06:22ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302026-01-01T00:06:22Z2026-01-01T00:06:22ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912026-01-01T00:06:22Z2026-01-01T00:06:22ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102026-01-01T00:06:22Z2026-01-01T00:06:22ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692026-01-01T00:06:22Z2026-01-01T00:06:22ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202026-01-01T00:06:22Z2026-01-01T00:06:22ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002026-01-01T00:06:22Z2026-01-01T00:06:22ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222026-01-01T00:06:22Z2026-01-01T00:06:22ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722026-01-01T00:06:22Z2026-01-01T00:06:22ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972026-01-01T00:06:22Z2026-01-01T00:06:22ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172026-01-01T00:06:22Z2026-01-01T00:06:22ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112026-01-01T00:06:22Z2026-01-01T00:06:22ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962026-01-01T00:06:22Z2026-01-01T00:06:22ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382026-01-01T00:06:22Z2026-01-01T00:06:22ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972026-01-01T00:06:22Z2026-01-01T00:06:22Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432026-01-01T00:06:22Z2026-01-01T00:06:22ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892026-01-01T00:06:22Z2026-01-01T00:06:22ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372026-01-01T00:06:22Z2026-01-01T00:06:22ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332026-01-01T00:06:22Z2026-01-01T00:06:22ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822026-01-01T00:06:22Z2026-01-01T00:06:22ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012026-01-01T00:06:22Z2026-01-01T00:06:22ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902026-01-01T00:06:22Z2026-01-01T00:06:22ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862026-01-01T00:06:22Z2026-01-01T00:06:22ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112026-01-01T00:06:22Z2026-01-01T00:06:22ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232026-01-01T00:06:22Z2026-01-01T00:06:22ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502026-01-01T00:06:22Z2026-01-01T00:06:22ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Computer forensicsent://SD_ILS/0/SD_ILS:137602026-01-01T00:06:22Z2026-01-01T00:06:22ZKruse II, Warren G. Heiser, Jay G.<br/>2002<br/>ISBN 9780201707199<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412026-01-01T00:06:22Z2026-01-01T00:06:22ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552026-01-01T00:06:22Z2026-01-01T00:06:22ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>The complete guide to security internetent://SD_ILS/0/SD_ILS:14302026-01-01T00:06:22Z2026-01-01T00:06:22ZMerkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780814470701<br/>