Search Results for Computer security - Narrowed by: BooksSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026ps$003d300$0026isd$003dtrue?dt=list2025-08-07T00:30:57ZMHPE: Computer Securityent://SD_ILS/0/SD_ILS:853172025-08-07T00:30:57Z2025-08-07T00:30:57ZRothke Ben<br/>2004<br/>Perpustakaan Jabatan<br/>ISBN 9780072230833<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:445592025-08-07T00:30:57Z2025-08-07T00:30:57ZBishop, Matt<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321247445<br/>Security : Computer forensics principles and practicesent://SD_ILS/0/SD_ILS:1012582025-08-07T00:30:57Z2025-08-07T00:30:57ZVolonino, Linda Anzaldua, Reynaldo Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131547278<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352025-08-07T00:30:57Z2025-08-07T00:30:57ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352025-08-07T00:30:57Z2025-08-07T00:30:57ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601852025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>Computer security: 20 things every employee should knowent://SD_ILS/0/SD_ILS:318042025-08-07T00:30:57Z2025-08-07T00:30:57ZCISSP, Ben Rothke<br/>2004<br/>ISBN 9780072230833<br/>Cybersecurity Lessons from CoVID-19ent://SD_ILS/0/SD_ILS:2857472025-08-07T00:30:57Z2025-08-07T00:30:57ZSlade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367682699<br/>Cybersecurity in the Covid-19 pandemicent://SD_ILS/0/SD_ILS:2857482025-08-07T00:30:57Z2025-08-07T00:30:57ZOkereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367610913<br/>Information securityent://SD_ILS/0/SD_ILS:2808472025-08-07T00:30:57Z2025-08-07T00:30:57ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Ccsp for dummiesent://SD_ILS/0/SD_ILS:2826212025-08-07T00:30:57Z2025-08-07T00:30:57ZArthur, J. Deane<br/>2021 2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119648376<br/>Security fundamentalsent://SD_ILS/0/SD_ILS:2731482025-08-07T00:30:57Z2025-08-07T00:30:57ZPanek, Crystal<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119650669<br/>Penetration Testing For Dummiesent://SD_ILS/0/SD_ILS:2743172025-08-07T00:30:57Z2025-08-07T00:30:57ZShimonski, Robert<br/>2020<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN 9781119577485<br/>Hacker Techniques, Tools, And Incident Handlingent://SD_ILS/0/SD_ILS:2703112025-08-07T00:30:57Z2025-08-07T00:30:57ZOriyano, Sean-Philip Solomon, Michael (Michael G.), 1963- author.<br/>2020<br/>Perpustakaan Lembah Pantai Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284147803<br/>Professional hackersent://SD_ILS/0/SD_ILS:2817832025-08-07T00:30:57Z2025-08-07T00:30:57ZMorkes, Andrew<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781422243008<br/>Comptia pentest certification for dummiesent://SD_ILS/0/SD_ILS:2826182025-08-07T00:30:57Z2025-08-07T00:30:57ZClarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119633556<br/>The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-08-07T00:30:57Z2025-08-07T00:30:57ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Hardware Security : A Hands-On Learning Approachent://SD_ILS/0/SD_ILS:2612572025-08-07T00:30:57Z2025-08-07T00:30:57ZBhunia,Swarup<br/>2019 2018<br/>ISBN 9780128124772<br/>Management Of Information Securityent://SD_ILS/0/SD_ILS:2612542025-08-07T00:30:57Z2025-08-07T00:30:57ZWhitman, Michael E., Mattford, Herbert J., author.<br/>2019<br/>ISBN 9781337405713<br/>The Next Billion User Digitsl Life Beyond The Westent://SD_ILS/0/SD_ILS:2709962025-08-07T00:30:57Z2025-08-07T00:30:57ZPayal Arora<br/>2019<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780674983786<br/>KESEDARAN KESELAMATAN SIBERent://SD_ILS/0/SD_ILS:2809152025-08-07T00:30:57Z2025-08-07T00:30:57ZMasnizah Mohd Masnizah Mohd., editor. Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674127176<br/>Network Security And Cryptography : A Self-Teaching Introductionent://SD_ILS/0/SD_ILS:2640212025-08-07T00:30:57Z2025-08-07T00:30:57ZMusa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781942270836<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-08-07T00:30:57Z2025-08-07T00:30:57ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-08-07T00:30:57Z2025-08-07T00:30:57ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792025-08-07T00:30:57Z2025-08-07T00:30:57ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>Google Cybersecurity Expert Parisa Tabrizent://SD_ILS/0/SD_ILS:2692072025-08-07T00:30:57Z2025-08-07T00:30:57ZDiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781541500075<br/>Understanding the digital world : what you need to know about computers, the internet, privacy, and securityent://SD_ILS/0/SD_ILS:2482662025-08-07T00:30:57Z2025-08-07T00:30:57ZKernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780691176543<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-08-07T00:30:57Z2025-08-07T00:30:57ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Big Data Analytics In Cybersecurityent://SD_ILS/0/SD_ILS:2640142025-08-07T00:30:57Z2025-08-07T00:30:57ZSavas, Onur Savas, Onur, editor. Deng, Julia, editor.<br/>2017<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Jabatan<br/>ISBN 9781498772129<br/>Network And Data Security For Non-Engineersent://SD_ILS/0/SD_ILS:2564402025-08-07T00:30:57Z2025-08-07T00:30:57ZGroom,Frank; Groom,Kevin; Jones,Stephan author Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781498767866<br/>Security In The Private Cloudent://SD_ILS/0/SD_ILS:2564412025-08-07T00:30:57Z2025-08-07T00:30:57ZVacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781482259551<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-08-07T00:30:57Z2025-08-07T00:30:57ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-08-07T00:30:57Z2025-08-07T00:30:57ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Introduction To Certificateless Cryptographyent://SD_ILS/0/SD_ILS:2557092025-08-07T00:30:57Z2025-08-07T00:30:57ZXiong, Hu Qin, Zhen, 1982- author. Vasilakos, Athanasios, author.<br/>2016<br/>ISBN 9781482248609<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:2195742025-08-07T00:30:57Z2025-08-07T00:30:57ZShoemaker, Dan, author. Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781285169903<br/>Kisah benar cyber 999 : kompilasi coretan hidup di alam siberent://SD_ILS/0/SD_ILS:2276472025-08-07T00:30:57Z2025-08-07T00:30:57Z2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Lembah Pantai Perpustakaan Medan Idaman<br/>ISBN 9789678606134<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:2304002025-08-07T00:30:57Z2025-08-07T00:30:57ZSchneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119092438<br/>Cyber terrorism : policy and technical perspectiveent://SD_ILS/0/SD_ILS:2335512025-08-07T00:30:57Z2025-08-07T00:30:57ZShahrin Sahib Rabiah Ahmad Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670257464<br/>Future crimesent://SD_ILS/0/SD_ILS:2358832025-08-07T00:30:57Z2025-08-07T00:30:57ZGoodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN 9780593073667<br/>Teknologi Hacking & Pencegahanent://SD_ILS/0/SD_ILS:2880952025-08-07T00:30:57Z2025-08-07T00:30:57ZKurniawan, Dedik, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Izyan Khalidah Wasli, editor. Java Creativity, author.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443238<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912025-08-07T00:30:57Z2025-08-07T00:30:57ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102025-08-07T00:30:57Z2025-08-07T00:30:57ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Koleksi Lengkap SOFTWARE HACKING & TEKNIK PENGHALANGent://SD_ILS/0/SD_ILS:2912162025-08-07T00:30:57Z2025-08-07T00:30:57ZKurniawan, Dedik, author. Nik Fauzi, translator. Rosnah Yassin, editor. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443245<br/>Java coding guidelines : 75 recommendations for reliable and secure programsent://SD_ILS/0/SD_ILS:2192372025-08-07T00:30:57Z2025-08-07T00:30:57ZLong, Fred, 1947- author Mohindra, Dhruv, author Seacord, Robert C., author Sutherland, Dean F., author Svoboda, David (Software security engineer), author<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321933157<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-08-07T00:30:57Z2025-08-07T00:30:57ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Information security for managersent://SD_ILS/0/SD_ILS:2067052025-08-07T00:30:57Z2025-08-07T00:30:57ZWorkman, Michael D., 1957- Phelps, Daniel C. Gathegi, John Ng’ang’a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763793012<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-08-07T00:30:57Z2025-08-07T00:30:57ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Cyberspace Survival Guide : Combating computer virusesent://SD_ILS/0/SD_ILS:2221482025-08-07T00:30:57Z2025-08-07T00:30:57ZShea, John M.<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972126<br/>Online privacyent://SD_ILS/0/SD_ILS:2224682025-08-07T00:30:57Z2025-08-07T00:30:57ZMarzolf, Julie Schwab Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972249<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-08-07T00:30:57Z2025-08-07T00:30:57ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>IT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:1877812025-08-07T00:30:57Z2025-08-07T00:30:57ZCalder, Alan Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780749464851<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-08-07T00:30:57Z2025-08-07T00:30:57ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-08-07T00:30:57Z2025-08-07T00:30:57ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>An unprogrammed life : adventures of an incurable entrepreneurent://SD_ILS/0/SD_ILS:1791702025-08-07T00:30:57Z2025-08-07T00:30:57ZSaito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118077030<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:1793012025-08-07T00:30:57Z2025-08-07T00:30:57ZWong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071744003<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:1793062025-08-07T00:30:57Z2025-08-07T00:30:57ZSullivan, Bryan, 1974- Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780071776165<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:1848012025-08-07T00:30:57Z2025-08-07T00:30:57ZBahadur, Gary Inasi, Jason De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071769051<br/>Privacy, security, and cyberspaceent://SD_ILS/0/SD_ILS:1872732025-08-07T00:30:57Z2025-08-07T00:30:57ZPlotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780816077564<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-08-07T00:30:57Z2025-08-07T00:30:57ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-08-07T00:30:57Z2025-08-07T00:30:57ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-08-07T00:30:57Z2025-08-07T00:30:57ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>Keselamatan komputer dan internet:ent://SD_ILS/0/SD_ILS:1395712025-08-07T00:30:57Z2025-08-07T00:30:57ZZabri Zakaria Noor Azilawati Mohd Sabda<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Kuala Lumpur, Cawangan Sri Sabah Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak<br/>ISBN 9789833859917<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-08-07T00:30:57Z2025-08-07T00:30:57ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>Security information and event management (SIEM) implementation:ent://SD_ILS/0/SD_ILS:1412992025-08-07T00:30:57Z2025-08-07T00:30:57Z2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071701099<br/>Handbook of eID security: concepts, practical experiences, technologiesent://SD_ILS/0/SD_ILS:1413232025-08-07T00:30:57Z2025-08-07T00:30:57ZFumy, Walter<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9783895783791<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-08-07T00:30:57Z2025-08-07T00:30:57ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengajaent://SD_ILS/0/SD_ILS:1419282025-08-07T00:30:57Z2025-08-07T00:30:57ZSetiawan, Bardy Joko<br/>2011 2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Pustaka KL @ Keramat<br/>ISBN 9789673712922<br/>WikiLeaks : inside Julian Assange's war on secrecyent://SD_ILS/0/SD_ILS:1467852025-08-07T00:30:57Z2025-08-07T00:30:57ZLeigh, David, 1946- Harding, Luke, 1968-<br/>2011<br/>ISBN 9780852652398<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1915732025-08-07T00:30:57Z2025-08-07T00:30:57ZHoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496513<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:1915752025-08-07T00:30:57Z2025-08-07T00:30:57ZHoog, Andrew Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496599<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:1835952025-08-07T00:30:57Z2025-08-07T00:30:57ZHoward, Doug Prince, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470639559<br/>The computer : a very short introductionent://SD_ILS/0/SD_ILS:1857842025-08-07T00:30:57Z2025-08-07T00:30:57ZInce, D. (Darrel)<br/>Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this Very Short Introduction, Darrel Ince looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA--<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Muhibbah<br/>ISBN 9780199586592<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1725402025-08-07T00:30:57Z2025-08-07T00:30:57ZCanavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470916216<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-08-07T00:30:57Z2025-08-07T00:30:57ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>Microsoft Windows security : essentialsent://SD_ILS/0/SD_ILS:1765952025-08-07T00:30:57Z2025-08-07T00:30:57ZGibson, Darril.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118016848<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-08-07T00:30:57Z2025-08-07T00:30:57ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:1476302025-08-07T00:30:57Z2025-08-07T00:30:57ZGrama, Joanna Lyn.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791858<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-08-07T00:30:57Z2025-08-07T00:30:57ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1414082025-08-07T00:30:57Z2025-08-07T00:30:57ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvd :ent://SD_ILS/0/SD_ILS:1932442025-08-07T00:30:57Z2025-08-07T00:30:57ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1679302025-08-07T00:30:57Z2025-08-07T00:30:57ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:1724672025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L., 1938- Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470589878<br/>IT security metrics : a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:1725412025-08-07T00:30:57Z2025-08-07T00:30:57ZHayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071713405<br/>Dear hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:1473092025-08-07T00:30:57Z2025-08-07T00:30:57ZGoldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470620069<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:1189622025-08-07T00:30:57Z2025-08-07T00:30:57ZLacey, David<br/>2009<br/>ISBN 9780470721995<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-08-07T00:30:57Z2025-08-07T00:30:57ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:1243232025-08-07T00:30:57Z2025-08-07T00:30:57ZChiesa, Raoul, 1973- Ciappi, Silvio Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781420086935<br/>Teknik menggempur virusent://SD_ILS/0/SD_ILS:1317312025-08-07T00:30:57Z2025-08-07T00:30:57ZMuhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789675065750<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-08-07T00:30:57Z2025-08-07T00:30:57Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Teknik menggempur virusent://SD_ILS/0/SD_ILS:1886182025-08-07T00:30:57Z2025-08-07T00:30:57ZMuhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak<br/>ISBN 9789675065750<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-08-07T00:30:57Z2025-08-07T00:30:57ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-08-07T00:30:57Z2025-08-07T00:30:57ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>Network security fundamentalsent://SD_ILS/0/SD_ILS:956172025-08-07T00:30:57Z2025-08-07T00:30:57ZCole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Lembah Pantai<br/>ISBN 9780470101926<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:962372025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:971362025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978962025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978542025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:986982025-08-07T00:30:57Z2025-08-07T00:30:57ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The new school information securityent://SD_ILS/0/SD_ILS:999922025-08-07T00:30:57Z2025-08-07T00:30:57ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1012482025-08-07T00:30:57Z2025-08-07T00:30:57ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Schneier on securityent://SD_ILS/0/SD_ILS:1154402025-08-07T00:30:57Z2025-08-07T00:30:57ZSchneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470395356<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:1160432025-08-07T00:30:57Z2025-08-07T00:30:57ZHoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470238387<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-08-07T00:30:57Z2025-08-07T00:30:57ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>Hackers' handbook 3.0 : Includes wifi, identity theft, information warfare and web 2.0ent://SD_ILS/0/SD_ILS:1240472025-08-07T00:30:57Z2025-08-07T00:30:57ZK.Dr.<br/>2008<br/>ISBN 9781847321107<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-08-07T00:30:57Z2025-08-07T00:30:57ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1086542025-08-07T00:30:57Z2025-08-07T00:30:57ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1118852025-08-07T00:30:57Z2025-08-07T00:30:57Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780735625167<br/>Window Server 2008ent://SD_ILS/0/SD_ILS:1128172025-08-07T00:30:57Z2025-08-07T00:30:57Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1296362025-08-07T00:30:57Z2025-08-07T00:30:57Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:2173592025-08-07T00:30:57Z2025-08-07T00:30:57ZVolonino, Linda. Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN 9780470371916<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-08-07T00:30:57Z2025-08-07T00:30:57ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-08-07T00:30:57Z2025-08-07T00:30:57ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-08-07T00:30:57Z2025-08-07T00:30:57ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Network security fundamentals project manualent://SD_ILS/0/SD_ILS:956182025-08-07T00:30:57Z2025-08-07T00:30:57ZReese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470127988<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-08-07T00:30:57Z2025-08-07T00:30:57ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-08-07T00:30:57Z2025-08-07T00:30:57ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-08-07T00:30:57Z2025-08-07T00:30:57ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-08-07T00:30:57Z2025-08-07T00:30:57ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632025-08-07T00:30:57Z2025-08-07T00:30:57ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-08-07T00:30:57Z2025-08-07T00:30:57ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-08-07T00:30:57Z2025-08-07T00:30:57ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Cyber crime investigations : bridging the gaps between security professional, law enforcement and prosecutorsent://SD_ILS/0/SD_ILS:1343602025-08-07T00:30:57Z2025-08-07T00:30:57Z2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597491334<br/>Data protection and information lifecycle managementent://SD_ILS/0/SD_ILS:561102025-08-07T00:30:57Z2025-08-07T00:30:57ZPetrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131927575<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:561642025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark<br/>2006<br/>ISBN 9780131547292<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-08-07T00:30:57Z2025-08-07T00:30:57ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>Big momma's houseent://SD_ILS/0/SD_ILS:760602025-08-07T00:30:57Z2025-08-07T00:30:57ZLawrence, Martin<br/>Nonstop laughs are back in the house! Hot on the heels of the mega-hit Big Momma's House comes a super-sizes sequel that's wilder, funnier, and more enormously entertaining than the original!. In the interest of national Security, FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slamdunking Southern granny with attitude to spare. Now this granny must play nanny to three dysfunctioalupper-class kids in order to spy on their computer hacker dad. Buursting at the seams with lightearted lunacy and eye-popping sight gags, BigMomma's House 2 is loads of fun for the whole family!<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:776782025-08-07T00:30:57Z2025-08-07T00:30:57ZFadia, Ankit.<br/>2006<br/>ISBN 9781598630626<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:843602025-08-07T00:30:57Z2025-08-07T00:30:57ZStamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471738480<br/>The art of intrusion : The real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:1239522025-08-07T00:30:57Z2025-08-07T00:30:57ZMitnick, Kevin D. Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471782667<br/>Surat pekelililing am bilangan 4 tahun 2006 : pengurusan pengendalian insiden keselamatan teknologi maklumat dan komunikasi (ICT) sektor awament://SD_ILS/0/SD_ILS:1293092025-08-07T00:30:57Z2025-08-07T00:30:57ZJabatan Perdana Menteri<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-08-07T00:30:57Z2025-08-07T00:30:57ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042025-08-07T00:30:57Z2025-08-07T00:30:57Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-08-07T00:30:57Z2025-08-07T00:30:57ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:552832025-08-07T00:30:57Z2025-08-07T00:30:57ZCarvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321200983<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972025-08-07T00:30:57Z2025-08-07T00:30:57Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-08-07T00:30:57Z2025-08-07T00:30:57ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>E-security law and strategyent://SD_ILS/0/SD_ILS:737752025-08-07T00:30:57Z2025-08-07T00:30:57ZZaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789679626322<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-08-07T00:30:57Z2025-08-07T00:30:57ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Hardening network securityent://SD_ILS/0/SD_ILS:787542025-08-07T00:30:57Z2025-08-07T00:30:57ZMallery, John<br/>2005<br/>ISBN 9780072257038<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-08-07T00:30:57Z2025-08-07T00:30:57ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>The business case for network security : advocacy, governance and ROIent://SD_ILS/0/SD_ILS:440642025-08-07T00:30:57Z2025-08-07T00:30:57ZPaquet, Catherine Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201219<br/>High-tech crimes revealed : cyberwar stories from the digital frontent://SD_ILS/0/SD_ILS:440872025-08-07T00:30:57Z2025-08-07T00:30:57ZBranigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321218735<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:442812025-08-07T00:30:57Z2025-08-07T00:30:57ZCarvey, Harlan<br/>2005<br/>ISBN 9780321200983<br/>Troubleshooting linux firewallsent://SD_ILS/0/SD_ILS:443062025-08-07T00:30:57Z2025-08-07T00:30:57ZShinn, Michael Shinn, Scott<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321227232<br/>Internet denial of service : attack and defence mechanisment://SD_ILS/0/SD_ILS:443602025-08-07T00:30:57Z2025-08-07T00:30:57ZMirkovic, Jelena Dietrich, Sven Dittrich, David<br/>2005 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131475731<br/>The tao of network security monitoring : beyond instrusion detectionent://SD_ILS/0/SD_ILS:452762025-08-07T00:30:57Z2025-08-07T00:30:57ZBejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321246776<br/>Network securityent://SD_ILS/0/SD_ILS:476792025-08-07T00:30:57Z2025-08-07T00:30:57ZPardoe, Terry D. Snyder, Gordon F.<br/>2005<br/>ISBN 9781401882143<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822025-08-07T00:30:57Z2025-08-07T00:30:57ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-08-07T00:30:57Z2025-08-07T00:30:57ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-08-07T00:30:57Z2025-08-07T00:30:57ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-08-07T00:30:57Z2025-08-07T00:30:57ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042025-08-07T00:30:57Z2025-08-07T00:30:57ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302025-08-07T00:30:57Z2025-08-07T00:30:57ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Extreme exploits : advanced defenses against hardcore hacksent://SD_ILS/0/SD_ILS:618652025-08-07T00:30:57Z2025-08-07T00:30:57ZOppleman, Victor<br/>2005<br/>ISBN 9780072259551<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-08-07T00:30:57Z2025-08-07T00:30:57ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Linux securityent://SD_ILS/0/SD_ILS:379162025-08-07T00:30:57Z2025-08-07T00:30:57Z2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861251554<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:419922025-08-07T00:30:57Z2025-08-07T00:30:57ZHoglund, Greg<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201786958<br/>J2EE security for servlets, EJBs and web services : applying theory and standards to practiceent://SD_ILS/0/SD_ILS:436372025-08-07T00:30:57Z2025-08-07T00:30:57ZPankaj Kumar<br/>2004<br/>ISBN 9780131402645<br/>Enterprise java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:436802025-08-07T00:30:57Z2025-08-07T00:30:57ZPistoia, Marco Nagaratnam, Nataraj Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321118899<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:440842025-08-07T00:30:57Z2025-08-07T00:30:57ZPalmer, Brandon<br/>2004<br/>ISBN 9780321193667<br/>Wi-Fooent://SD_ILS/0/SD_ILS:442802025-08-07T00:30:57Z2025-08-07T00:30:57ZVladimirov, Andrew A. Gavrilenko, Konstantin V. Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321202178<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:443022025-08-07T00:30:57Z2025-08-07T00:30:57ZBrown, Keith<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321228352<br/>Forensic discoveryent://SD_ILS/0/SD_ILS:443612025-08-07T00:30:57Z2025-08-07T00:30:57ZFarmer, Dan Venema, Wietse<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201634976<br/>TechTV security alert : stories of real people protecting themselves from identity theft, scams and virusesent://SD_ILS/0/SD_ILS:445022025-08-07T00:30:57Z2025-08-07T00:30:57ZWorley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735713529<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862025-08-07T00:30:57Z2025-08-07T00:30:57ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-08-07T00:30:57Z2025-08-07T00:30:57ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-08-07T00:30:57Z2025-08-07T00:30:57ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2512862025-08-07T00:30:57Z2025-08-07T00:30:57ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780072230208<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442025-08-07T00:30:57Z2025-08-07T00:30:57ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-08-07T00:30:57Z2025-08-07T00:30:57ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:214922025-08-07T00:30:57Z2025-08-07T00:30:57ZCampbell, Paul Calvert, Ben Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780619120177<br/>Identity theftent://SD_ILS/0/SD_ILS:452692025-08-07T00:30:57Z2025-08-07T00:30:57ZVacca, John R.<br/>2003<br/>ISBN 9780130082756<br/>Inside the security mind : making the tough decisionsent://SD_ILS/0/SD_ILS:452702025-08-07T00:30:57Z2025-08-07T00:30:57ZDay, Kevin<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131118294<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-08-07T00:30:57Z2025-08-07T00:30:57ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:508412025-08-07T00:30:57Z2025-08-07T00:30:57Z2002<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:536472025-08-07T00:30:57Z2025-08-07T00:30:57ZMoorhouse, Karin<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:565462025-08-07T00:30:57Z2025-08-07T00:30:57Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:566642025-08-07T00:30:57Z2025-08-07T00:30:57Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Writing secure codeent://SD_ILS/0/SD_ILS:50102025-08-07T00:30:57Z2025-08-07T00:30:57ZHoward, Michael LeBlanc, David<br/>2002<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780735615885<br/>Internet Securityent://SD_ILS/0/SD_ILS:56042025-08-07T00:30:57Z2025-08-07T00:30:57ZSchweitzer, Douglas<br/>2002<br/>ISBN 9780814471425<br/>Safety net : protecting your business on the internetent://SD_ILS/0/SD_ILS:74142025-08-07T00:30:57Z2025-08-07T00:30:57ZSindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471079620<br/>Wireless security models, threats and solutionsent://SD_ILS/0/SD_ILS:86032025-08-07T00:30:57Z2025-08-07T00:30:57ZNichols, Randall K. Lekkas, Panos C.<br/>2002<br/>ISBN 9780071207072<br/>Building secure servers with Linuxent://SD_ILS/0/SD_ILS:313472025-08-07T00:30:57Z2025-08-07T00:30:57ZBauer, Michael D.<br/>2002<br/>ISBN 9780596002176<br/>Confessions teenage of hanckersent://SD_ILS/0/SD_ILS:112672025-08-07T00:30:57Z2025-08-07T00:30:57ZVerton, Dan<br/>2002<br/>ISBN 9780072223644<br/>CCSA next generation check point certified security administrator study guideent://SD_ILS/0/SD_ILS:112682025-08-07T00:30:57Z2025-08-07T00:30:57Z2002<br/>ISBN 9780072194203<br/>Data networks : routing, security and performance optimizationent://SD_ILS/0/SD_ILS:128132025-08-07T00:30:57Z2025-08-07T00:30:57ZKenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781555582715<br/>Computer forensicsent://SD_ILS/0/SD_ILS:137602025-08-07T00:30:57Z2025-08-07T00:30:57ZKruse II, Warren G. Heiser, Jay G.<br/>2002<br/>ISBN 9780201707199<br/>The e-privacy imperativeent://SD_ILS/0/SD_ILS:155102025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S. Breithaupt, James<br/>2002<br/>ISBN 9780814406281<br/>The secured enterpriseent://SD_ILS/0/SD_ILS:160742025-08-07T00:30:57Z2025-08-07T00:30:57ZProctor, Paul E. Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780130619068<br/>New economy equity : Navigating security and legal issues in digital businessent://SD_ILS/0/SD_ILS:183082025-08-07T00:30:57Z2025-08-07T00:30:57ZBond, Robert<br/>2002<br/>ISBN 9780470843871<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-08-07T00:30:57Z2025-08-07T00:30:57ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:220812025-08-07T00:30:57Z2025-08-07T00:30:57Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781931836500<br/>Pengenalan Kepada keselamtan komputerent://SD_ILS/0/SD_ILS:284362025-08-07T00:30:57Z2025-08-07T00:30:57ZOmar Zakaria Laila Mat Kiah<br/>2002<br/>ISBN 9789839340853<br/>Privacy & data protectionent://SD_ILS/0/SD_ILS:1027432025-08-07T00:30:57Z2025-08-07T00:30:57ZAbu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9789839088731<br/>Privacy & data protection : a comprehensive analysis with special reference to the malaysian proposed lawent://SD_ILS/0/SD_ILS:1101282025-08-07T00:30:57Z2025-08-07T00:30:57ZAbu Bakar Munir Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789839088731<br/>Security transformation: digital defense strategies to protect your company's reputation and market shareent://SD_ILS/0/SD_ILS:15092025-08-07T00:30:57Z2025-08-07T00:30:57ZMcCarthy, Mary Pat Campbell, Stuart Brownstein, Rob<br/>2001<br/>ISBN 9780071379663<br/>IPSEC securing VPNsent://SD_ILS/0/SD_ILS:27022025-08-07T00:30:57Z2025-08-07T00:30:57ZDavis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072017571<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552025-08-07T00:30:57Z2025-08-07T00:30:57ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>Enterprise security with EJB and COBRAent://SD_ILS/0/SD_ILS:73342025-08-07T00:30:57Z2025-08-07T00:30:57ZHartman, Bret Flinn, Donald J. Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471401315<br/>Protect yourself onlineent://SD_ILS/0/SD_ILS:388232025-08-07T00:30:57Z2025-08-07T00:30:57ZDanda, Matthew<br/>2001<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780735611887<br/>Careers in e-commerce security and cryptionent://SD_ILS/0/SD_ILS:300112025-08-07T00:30:57Z2025-08-07T00:30:57ZHayhurst, Chris<br/>2001<br/>ISBN 9780823934201<br/>Microsoft windows 2000 security technical referenceent://SD_ILS/0/SD_ILS:12112025-08-07T00:30:57Z2025-08-07T00:30:57Z-<br/>2000<br/>ISBN 9780735608580<br/>The complete guide to security internetent://SD_ILS/0/SD_ILS:14302025-08-07T00:30:57Z2025-08-07T00:30:57ZMerkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780814470701<br/>E-mail virus: protection handbookent://SD_ILS/0/SD_ILS:45432025-08-07T00:30:57Z2025-08-07T00:30:57Z2000<br/>ISBN 9781928994237<br/>Windows 2000 securityent://SD_ILS/0/SD_ILS:60052025-08-07T00:30:57Z2025-08-07T00:30:57ZMcLean, Ian<br/>2000<br/>ISBN 9781576103876<br/>Solaris securityent://SD_ILS/0/SD_ILS:445852025-08-07T00:30:57Z2025-08-07T00:30:57ZGregory, Peter H.<br/>2000<br/>ISBN 9780130960535<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1989502025-08-07T00:30:57Z2025-08-07T00:30:57ZSchneier, Bruce<br/>1996<br/>ISBN 9780471117094<br/>Computer Secutity managementent://SD_ILS/0/SD_ILS:1885522025-08-07T00:30:57Z2025-08-07T00:30:57ZKaren<br/>