Search Results for Computer security - Narrowed by: Books SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026ps$003d300?dt=list 2025-08-06T12:53:32Z MHPE: Computer Security ent://SD_ILS/0/SD_ILS:85317 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Rothke Ben<br/>2004<br/>Perpustakaan Jabatan<br/>ISBN&#160;9780072230833<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:44559 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bishop, Matt<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321247445<br/> Security : Computer forensics principles and practices ent://SD_ILS/0/SD_ILS:101258 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Volonino, Linda&#160;Anzaldua, Reynaldo&#160;Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131547278<br/> Simple computer security : Disinfect your PC ent://SD_ILS/0/SD_ILS:123935 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Geier, Eric&#160;Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470068540<br/> Simple computer security : Disinfect your PC ent://SD_ILS/0/SD_ILS:124635 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Geier, Eric&#160;Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470068540<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60089 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60137 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60185 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781401862657<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:60233 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781401862657<br/> Computer security: 20 things every employee should know ent://SD_ILS/0/SD_ILS:31804 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z CISSP, Ben Rothke<br/>2004<br/>ISBN&#160;9780072230833<br/> Cybersecurity Lessons from CoVID-19 ent://SD_ILS/0/SD_ILS:285747 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Slade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780367682699<br/> Cybersecurity in the Covid-19 pandemic ent://SD_ILS/0/SD_ILS:285748 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Okereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780367610913<br/> Information security ent://SD_ILS/0/SD_ILS:280847 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Noor Suhana Sulaiman&#160;Alsaggoff, Syed Zulkarnain Syed Idrus, author.&#160;Amiza Amir, author&#160;Wan Aniul Alyani Wan Mohamed, author.&#160;Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670922997<br/> Ccsp for dummies ent://SD_ILS/0/SD_ILS:282621 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Arthur, J. Deane<br/>2021&#160;2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119648376<br/> Security fundamentals ent://SD_ILS/0/SD_ILS:273148 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Panek, Crystal<br/>2020<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119650669<br/> Penetration Testing For Dummies ent://SD_ILS/0/SD_ILS:274317 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shimonski, Robert<br/>2020<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN&#160;9781119577485<br/> Hacker Techniques, Tools, And Incident Handling ent://SD_ILS/0/SD_ILS:270311 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Oriyano, Sean-Philip&#160;Solomon, Michael (Michael G.), 1963- author.<br/>2020<br/>Perpustakaan Lembah Pantai&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284147803<br/> Professional hackers ent://SD_ILS/0/SD_ILS:281783 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Morkes, Andrew<br/>2020<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781422243008<br/> Comptia pentest certification for dummies ent://SD_ILS/0/SD_ILS:282618 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Clarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119633556<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Hardware Security : A Hands-On Learning Approach ent://SD_ILS/0/SD_ILS:261257 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bhunia,Swarup<br/>2019&#160;2018<br/>ISBN&#160;9780128124772<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> The Next Billion User Digitsl Life Beyond The West ent://SD_ILS/0/SD_ILS:270996 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Payal Arora<br/>2019<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780674983786<br/> KESEDARAN KESELAMATAN SIBER ent://SD_ILS/0/SD_ILS:280915 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Masnizah Mohd&#160;Masnizah Mohd., editor.&#160;Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789674127176<br/> Network Security And Cryptography : A Self-Teaching Introduction ent://SD_ILS/0/SD_ILS:264021 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Musa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781942270836<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Understanding Cyber Risk : Protecting Your Corporate Assets ent://SD_ILS/0/SD_ILS:267279 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Koehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781472477798<br/> Google Cybersecurity Expert Parisa Tabriz ent://SD_ILS/0/SD_ILS:269207 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z DiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781541500075<br/> Understanding the digital world : what you need to know about computers, the internet, privacy, and security ent://SD_ILS/0/SD_ILS:248266 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780691176543<br/> The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data ent://SD_ILS/0/SD_ILS:253495 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Mitnick,Kevin D; Vamosi Robert&#160;Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780316380508<br/> Big Data Analytics In Cybersecurity ent://SD_ILS/0/SD_ILS:264014 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Savas, Onur&#160;Savas, Onur, editor.&#160;Deng, Julia, editor.<br/>2017<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Jabatan<br/>ISBN&#160;9781498772129<br/> Network And Data Security For Non-Engineers ent://SD_ILS/0/SD_ILS:256440 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Groom,Frank; Groom,Kevin;&#160;Jones,Stephan author&#160;Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781498767866<br/> Security In The Private Cloud ent://SD_ILS/0/SD_ILS:256441 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Vacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781482259551<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Introduction To Certificateless Cryptography ent://SD_ILS/0/SD_ILS:255709 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Xiong, Hu&#160;Qin, Zhen, 1982- author.&#160;Vasilakos, Athanasios, author.<br/>2016<br/>ISBN&#160;9781482248609<br/> Cybersecurity : engineering a secure information technology organization ent://SD_ILS/0/SD_ILS:219574 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shoemaker, Dan, author.&#160;Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781285169903<br/> Kisah benar cyber 999 : kompilasi coretan hidup di alam siber ent://SD_ILS/0/SD_ILS:227647 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Muhibbah&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Lembah Pantai&#160;Perpustakaan Medan Idaman<br/>ISBN&#160;9789678606134<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Cyber terrorism : policy and technical perspective ent://SD_ILS/0/SD_ILS:233551 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shahrin Sahib&#160;Rabiah Ahmad&#160;Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Muhibbah&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670257464<br/> Future crimes ent://SD_ILS/0/SD_ILS:235883 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Goodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9780593073667<br/> Teknologi Hacking &amp; Pencegahan ent://SD_ILS/0/SD_ILS:288095 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kurniawan, Dedik, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Izyan Khalidah Wasli, editor.&#160;Java Creativity, author.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443238<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Koleksi Lengkap SOFTWARE HACKING &amp; TEKNIK PENGHALANG ent://SD_ILS/0/SD_ILS:291216 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kurniawan, Dedik, author.&#160;Nik Fauzi, translator.&#160;Rosnah Yassin, editor.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443245<br/> Java coding guidelines : 75 recommendations for reliable and secure programs ent://SD_ILS/0/SD_ILS:219237 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Long, Fred, 1947- author&#160;Mohindra, Dhruv, author&#160;Seacord, Robert C., author&#160;Sutherland, Dean F., author&#160;Svoboda, David (Software security engineer), author<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321933157<br/> Cyber security culture : counteracting cyber threats through organizational learning and training ent://SD_ILS/0/SD_ILS:202311 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Trim, Peter&#160;Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781409456940<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Virtualization security : protecting virtualized environments ent://SD_ILS/0/SD_ILS:207090 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118288122<br/> Cyberspace Survival Guide : Combating computer viruses ent://SD_ILS/0/SD_ILS:222148 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shea, John M.<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781433972126<br/> Online privacy ent://SD_ILS/0/SD_ILS:222468 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Marzolf, Julie Schwab&#160;Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781433972249<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> IT governance : an international guide to data security and ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:187781 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Calder, Alan&#160;Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780749464851<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:191583 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco)&#160;Essaaidi, Mohamed&#160;Ganzha, M. (Maria)&#160;Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607508175<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> An unprogrammed life : adventures of an incurable entrepreneur ent://SD_ILS/0/SD_ILS:179170 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Saito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118077030<br/> Security metrics : a beginner's guide ent://SD_ILS/0/SD_ILS:179301 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Wong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071744003<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Privacy, security, and cyberspace ent://SD_ILS/0/SD_ILS:187273 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Plotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780816077564<br/> Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:212280 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597499477<br/> Keselamatan komputer dan internet: ent://SD_ILS/0/SD_ILS:139571 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Zabri Zakaria&#160;Noor Azilawati Mohd Sabda<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Kuala Lumpur, Cawangan Sri Sabah&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak<br/>ISBN&#160;9789833859917<br/> Hacking exposed : web application security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:141269 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Scambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071740647<br/> Security information and event management (SIEM) implementation: ent://SD_ILS/0/SD_ILS:141299 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071701099<br/> Handbook of eID security: concepts, practical experiences, technologies ent://SD_ILS/0/SD_ILS:141323 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Fumy, Walter<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9783895783791<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengaja ent://SD_ILS/0/SD_ILS:141928 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Setiawan, Bardy Joko<br/>2011&#160;2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ Keramat<br/>ISBN&#160;9789673712922<br/> WikiLeaks : inside Julian Assange's war on secrecy ent://SD_ILS/0/SD_ILS:146785 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Leigh, David, 1946-&#160;Harding, Luke, 1968-<br/>2011<br/>ISBN&#160;9780852652398<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:191573 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597496513<br/> iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices ent://SD_ILS/0/SD_ILS:191575 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hoog, Andrew&#160;Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597496599<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:183595 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Howard, Doug&#160;Prince, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470639559<br/> The computer : a very short introduction ent://SD_ILS/0/SD_ILS:185784 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Ince, D. (Darrel)<br/>Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this Very Short Introduction, Darrel Ince looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA--<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Muhibbah<br/>ISBN&#160;9780199586592<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:175354 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Campagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470927533<br/> Microsoft Windows security : essentials ent://SD_ILS/0/SD_ILS:176595 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Gibson, Darril.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118016848<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:147630 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Grama, Joanna Lyn.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791858<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:147581 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Jang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791896<br/> Malware analyst's cookbook and dvd ent://SD_ILS/0/SD_ILS:141408 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470613030<br/> Malware analyst's cookbook and dvd : ent://SD_ILS/0/SD_ILS:193244 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470613030<br/> Malware analyst's cookbook and dvd ent://SD_ILS/0/SD_ILS:167930 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Ligh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:172467 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L., 1938-&#160;Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470589878<br/> IT security metrics : a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:172541 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071713405<br/> Dear hacker : letters to the editor of 2600 ent://SD_ILS/0/SD_ILS:147309 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Goldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470620069<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:118962 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Lacey, David<br/>2009<br/>ISBN&#160;9780470721995<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Profiling hackers : the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:124323 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Chiesa, Raoul, 1973-&#160;Ciappi, Silvio&#160;Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781420086935<br/> Teknik menggempur virus ent://SD_ILS/0/SD_ILS:131731 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Muhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789675065750<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:134361 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781439806920<br/> Teknik menggempur virus ent://SD_ILS/0/SD_ILS:188618 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Muhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak<br/>ISBN&#160;9789675065750<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:95617 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780470101926<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:96237 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97136 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97896 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97854 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:98698 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The new school information security ent://SD_ILS/0/SD_ILS:99992 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shostack, Adam<br/>2008<br/>ISBN&#160;9780321502780<br/> Cisco firewall video mentor ent://SD_ILS/0/SD_ILS:101248 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201981<br/> Schneier on security ent://SD_ILS/0/SD_ILS:115440 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470395356<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:116043 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470238387<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> Hackers' handbook 3.0 : Includes wifi, identity theft, information warfare and web 2.0 ent://SD_ILS/0/SD_ILS:124047 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z K.Dr.<br/>2008<br/>ISBN&#160;9781847321107<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Cisco firewall video mentor ent://SD_ILS/0/SD_ILS:108654 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201981<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:111885 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780735625167<br/> Window Server 2008 ent://SD_ILS/0/SD_ILS:112817 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:129636 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:217359 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Volonino, Linda.&#160;Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN&#160;9780470371916<br/> Trust in e-services : technologies, practices and challenges ent://SD_ILS/0/SD_ILS:93568 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Ronggong, Song&#160;Korba, Larry&#160;Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599042077<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Network security fundamentals project manual ent://SD_ILS/0/SD_ILS:95618 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Reese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470127988<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Information assurance for the enterprise : a roadmap to information security ent://SD_ILS/0/SD_ILS:89663 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schou, Corey&#160;Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072255249<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Cyber crime investigations : bridging the gaps between security professional, law enforcement and prosecutors ent://SD_ILS/0/SD_ILS:134360 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597491334<br/> Data protection and information lifecycle management ent://SD_ILS/0/SD_ILS:56110 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Petrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131927575<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:56164 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark<br/>2006<br/>ISBN&#160;9780131547292<br/> Managing cybersecurity resources : a cost-benefit analysis ent://SD_ILS/0/SD_ILS:58441 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Gordon, Lawrence A.<br/>2006<br/>ISBN&#160;9780071452854<br/> Big momma's house ent://SD_ILS/0/SD_ILS:76060 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Lawrence, Martin<br/>Nonstop laughs are back in the house! Hot on the heels of the mega-hit Big Momma's House comes a super-sizes sequel that's wilder, funnier, and more enormously entertaining than the original!. In the interest of national Security, FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slamdunking Southern granny with attitude to spare. Now this granny must play nanny to three dysfunctioalupper-class kids in order to spy on their computer hacker dad. Buursting at the seams with lightearted lunacy and eye-popping sight gags, BigMomma's House 2 is loads of fun for the whole family!<br/>2006<br/>Perpustakaan Kuala Lumpur<br/> The unofficial guide to ethical hacking ent://SD_ILS/0/SD_ILS:77678 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Fadia, Ankit.<br/>2006<br/>ISBN&#160;9781598630626<br/> Information security : principles and practices ent://SD_ILS/0/SD_ILS:84360 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Stamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471738480<br/> The art of intrusion : The real stories behind the exploits of hackers, intruders &amp; deceivers ent://SD_ILS/0/SD_ILS:123952 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Mitnick, Kevin D.&#160;Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471782667<br/> Surat pekelililing am bilangan 4 tahun 2006 : pengurusan pengendalian insiden keselamatan teknologi maklumat dan komunikasi (ICT) sektor awam ent://SD_ILS/0/SD_ILS:129309 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Jabatan Perdana Menteri<br/>2006<br/>Perpustakaan Kuala Lumpur<br/> The ciso handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:70961 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Gentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849319525<br/> Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:52104 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55138 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Windows forensics and incident recovery ent://SD_ILS/0/SD_ILS:55283 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Carvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321200983<br/> Privacy: what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:55897 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2005<br/>ISBN&#160;9780321224095<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:56543 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> E-security law and strategy ent://SD_ILS/0/SD_ILS:73775 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Zaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789679626322<br/> A brief history of cryptology ent://SD_ILS/0/SD_ILS:75268 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Boone, J.V.<br/>2005<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591140849<br/> Hardening network security ent://SD_ILS/0/SD_ILS:78754 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Mallery, John<br/>2005<br/>ISBN&#160;9780072257038<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:105563 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> The business case for network security : advocacy, governance and ROI ent://SD_ILS/0/SD_ILS:44064 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Paquet, Catherine&#160;Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781587201219<br/> High-tech crimes revealed : cyberwar stories from the digital front ent://SD_ILS/0/SD_ILS:44087 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Branigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321218735<br/> Windows forensics and incident recovery ent://SD_ILS/0/SD_ILS:44281 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Carvey, Harlan<br/>2005<br/>ISBN&#160;9780321200983<br/> Troubleshooting linux firewalls ent://SD_ILS/0/SD_ILS:44306 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shinn, Michael&#160;Shinn, Scott<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321227232<br/> Internet denial of service : attack and defence mechanism ent://SD_ILS/0/SD_ILS:44360 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Mirkovic, Jelena&#160;Dietrich, Sven&#160;Dittrich, David<br/>2005&#160;2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131475731<br/> The tao of network security monitoring : beyond instrusion detection ent://SD_ILS/0/SD_ILS:45276 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321246776<br/> Network security ent://SD_ILS/0/SD_ILS:47679 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Pardoe, Terry D.&#160;Snyder, Gordon F.<br/>2005<br/>ISBN&#160;9781401882143<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:47682 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cannon, J.C<br/>2005<br/>ISBN&#160;9780321224095<br/> Mapping security : the corporate security sourcebook for today's global economy ent://SD_ILS/0/SD_ILS:47701 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Patterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321304520<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:84103 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Hacker V Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:131730 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Man Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Extreme exploits : advanced defenses against hardcore hacks ent://SD_ILS/0/SD_ILS:61865 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Oppleman, Victor<br/>2005<br/>ISBN&#160;9780072259551<br/> Privacy : what developers and IT professionals should know ent://SD_ILS/0/SD_ILS:70590 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Cannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321224095<br/> Linux security ent://SD_ILS/0/SD_ILS:37916 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861251554<br/> Exploiting software : how to break code ent://SD_ILS/0/SD_ILS:41992 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hoglund, Greg<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780201786958<br/> J2EE security for servlets, EJBs and web services : applying theory and standards to practice ent://SD_ILS/0/SD_ILS:43637 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Pankaj Kumar<br/>2004<br/>ISBN&#160;9780131402645<br/> Enterprise java security : building secure J2EE applications ent://SD_ILS/0/SD_ILS:43680 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Pistoia, Marco&#160;Nagaratnam, Nataraj&#160;Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321118899<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:44084 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Palmer, Brandon<br/>2004<br/>ISBN&#160;9780321193667<br/> Wi-Foo ent://SD_ILS/0/SD_ILS:44280 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Vladimirov, Andrew A.&#160;Gavrilenko, Konstantin V.&#160;Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321202178<br/> The .NET developer's guide to Windows security ent://SD_ILS/0/SD_ILS:44302 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Brown, Keith<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321228352<br/> Forensic discovery ent://SD_ILS/0/SD_ILS:44361 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Farmer, Dan&#160;Venema, Wietse<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780201634976<br/> TechTV security alert : stories of real people protecting themselves from identity theft, scams and viruses ent://SD_ILS/0/SD_ILS:44502 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Worley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735713529<br/> Malware : fighting malicious code ent://SD_ILS/0/SD_ILS:47786 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Skoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131014053<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:251286 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780072230208<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:253344 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072230208<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:70982 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Fugini, Mariagrazia, 1957-&#160;Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591401865<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:21492 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Campbell, Paul&#160;Calvert, Ben&#160;Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780619120177<br/> Identity theft ent://SD_ILS/0/SD_ILS:45269 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Vacca, John R.<br/>2003<br/>ISBN&#160;9780130082756<br/> Inside the security mind : making the tough decisions ent://SD_ILS/0/SD_ILS:45270 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Day, Kevin<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131118294<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:50841 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2002<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:53647 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Moorhouse, Karin<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:56546 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781577292876<br/> Protect your home PC : hackers, viruses, and privacy ent://SD_ILS/0/SD_ILS:56664 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781577292876<br/> Writing secure code ent://SD_ILS/0/SD_ILS:5010 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Howard, Michael&#160;LeBlanc, David<br/>2002<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780735615885<br/> Internet Security ent://SD_ILS/0/SD_ILS:5604 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schweitzer, Douglas<br/>2002<br/>ISBN&#160;9780814471425<br/> Safety net : protecting your business on the internet ent://SD_ILS/0/SD_ILS:7414 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Sindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471079620<br/> Wireless security models, threats and solutions ent://SD_ILS/0/SD_ILS:8603 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Nichols, Randall K.&#160;Lekkas, Panos C.<br/>2002<br/>ISBN&#160;9780071207072<br/> Building secure servers with Linux ent://SD_ILS/0/SD_ILS:31347 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bauer, Michael D.<br/>2002<br/>ISBN&#160;9780596002176<br/> Confessions teenage of hanckers ent://SD_ILS/0/SD_ILS:11267 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Verton, Dan<br/>2002<br/>ISBN&#160;9780072223644<br/> CCSA next generation check point certified security administrator study guide ent://SD_ILS/0/SD_ILS:11268 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2002<br/>ISBN&#160;9780072194203<br/> Data networks : routing, security and performance optimization ent://SD_ILS/0/SD_ILS:12813 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781555582715<br/> Computer forensics ent://SD_ILS/0/SD_ILS:13760 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Kruse II, Warren G.&#160;Heiser, Jay G.<br/>2002<br/>ISBN&#160;9780201707199<br/> The e-privacy imperative ent://SD_ILS/0/SD_ILS:15510 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.&#160;Breithaupt, James<br/>2002<br/>ISBN&#160;9780814406281<br/> The secured enterprise ent://SD_ILS/0/SD_ILS:16074 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Proctor, Paul E.&#160;Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780130619068<br/> New economy equity : Navigating security and legal issues in digital business ent://SD_ILS/0/SD_ILS:18308 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Bond, Robert<br/>2002<br/>ISBN&#160;9780470843871<br/> Hacking exposed web applications ent://SD_ILS/0/SD_ILS:20241 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Scambray, Joel&#160;Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072224382<br/> Hack proofing XML ent://SD_ILS/0/SD_ILS:22081 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781931836500<br/> Pengenalan Kepada keselamtan komputer ent://SD_ILS/0/SD_ILS:28436 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Omar Zakaria&#160;Laila Mat Kiah<br/>2002<br/>ISBN&#160;9789839340853<br/> Privacy &amp; data protection ent://SD_ILS/0/SD_ILS:102743 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Abu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9789839088731<br/> Privacy &amp; data protection : a comprehensive analysis with special reference to the malaysian proposed law ent://SD_ILS/0/SD_ILS:110128 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Abu Bakar Munir&#160;Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789839088731<br/> Security transformation: digital defense strategies to protect your company's reputation and market share ent://SD_ILS/0/SD_ILS:1509 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z McCarthy, Mary Pat&#160;Campbell, Stuart&#160;Brownstein, Rob<br/>2001<br/>ISBN&#160;9780071379663<br/> IPSEC securing VPNs ent://SD_ILS/0/SD_ILS:2702 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Davis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072017571<br/> B2B and beyond ent://SD_ILS/0/SD_ILS:5155 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Demaio, Harry B.<br/>2001<br/>ISBN&#160;9780471054665<br/> Enterprise security with EJB and COBRA ent://SD_ILS/0/SD_ILS:7334 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hartman, Bret&#160;Flinn, Donald J.&#160;Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471401315<br/> Protect yourself online ent://SD_ILS/0/SD_ILS:38823 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Danda, Matthew<br/>2001<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780735611887<br/> Careers in e-commerce security and cryption ent://SD_ILS/0/SD_ILS:30011 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Hayhurst, Chris<br/>2001<br/>ISBN&#160;9780823934201<br/> Microsoft windows 2000 security technical reference ent://SD_ILS/0/SD_ILS:1211 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z -<br/>2000<br/>ISBN&#160;9780735608580<br/> The complete guide to security internet ent://SD_ILS/0/SD_ILS:1430 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Merkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780814470701<br/> E-mail virus: protection handbook ent://SD_ILS/0/SD_ILS:4543 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z 2000<br/>ISBN&#160;9781928994237<br/> Windows 2000 security ent://SD_ILS/0/SD_ILS:6005 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z McLean, Ian<br/>2000<br/>ISBN&#160;9781576103876<br/> Solaris security ent://SD_ILS/0/SD_ILS:44585 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Gregory, Peter H.<br/>2000<br/>ISBN&#160;9780130960535<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:198950 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Schneier, Bruce<br/>1996<br/>ISBN&#160;9780471117094<br/> Computer Secutity management ent://SD_ILS/0/SD_ILS:188552 2025-08-06T12:53:32Z 2025-08-06T12:53:32Z Karen<br/>