Search Results for Computer security - Narrowed by: EnglishSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300$0026isd$003dtrue?dt=list2025-08-07T03:35:38ZSecurity : Computer forensics principles and practicesent://SD_ILS/0/SD_ILS:1012582025-08-07T03:35:38Z2025-08-07T03:35:38ZVolonino, Linda Anzaldua, Reynaldo Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131547278<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352025-08-07T03:35:38Z2025-08-07T03:35:38ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352025-08-07T03:35:38Z2025-08-07T03:35:38ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Cybersecurity Lessons from CoVID-19ent://SD_ILS/0/SD_ILS:2857472025-08-07T03:35:38Z2025-08-07T03:35:38ZSlade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367682699<br/>Cybersecurity in the Covid-19 pandemicent://SD_ILS/0/SD_ILS:2857482025-08-07T03:35:38Z2025-08-07T03:35:38ZOkereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367610913<br/>Information securityent://SD_ILS/0/SD_ILS:2808472025-08-07T03:35:38Z2025-08-07T03:35:38ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Ccsp for dummiesent://SD_ILS/0/SD_ILS:2826212025-08-07T03:35:38Z2025-08-07T03:35:38ZArthur, J. Deane<br/>2021 2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119648376<br/>Security fundamentalsent://SD_ILS/0/SD_ILS:2731482025-08-07T03:35:38Z2025-08-07T03:35:38ZPanek, Crystal<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119650669<br/>Penetration Testing For Dummiesent://SD_ILS/0/SD_ILS:2743172025-08-07T03:35:38Z2025-08-07T03:35:38ZShimonski, Robert<br/>2020<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN 9781119577485<br/>Hacker Techniques, Tools, And Incident Handlingent://SD_ILS/0/SD_ILS:2703112025-08-07T03:35:38Z2025-08-07T03:35:38ZOriyano, Sean-Philip Solomon, Michael (Michael G.), 1963- author.<br/>2020<br/>Perpustakaan Lembah Pantai Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284147803<br/>Professional hackersent://SD_ILS/0/SD_ILS:2817832025-08-07T03:35:38Z2025-08-07T03:35:38ZMorkes, Andrew<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781422243008<br/>Comptia pentest certification for dummiesent://SD_ILS/0/SD_ILS:2826182025-08-07T03:35:38Z2025-08-07T03:35:38ZClarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119633556<br/>The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-08-07T03:35:38Z2025-08-07T03:35:38ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Hardware Security : A Hands-On Learning Approachent://SD_ILS/0/SD_ILS:2612572025-08-07T03:35:38Z2025-08-07T03:35:38ZBhunia,Swarup<br/>2019 2018<br/>ISBN 9780128124772<br/>Management Of Information Securityent://SD_ILS/0/SD_ILS:2612542025-08-07T03:35:38Z2025-08-07T03:35:38ZWhitman, Michael E., Mattford, Herbert J., author.<br/>2019<br/>ISBN 9781337405713<br/>The Next Billion User Digitsl Life Beyond The Westent://SD_ILS/0/SD_ILS:2709962025-08-07T03:35:38Z2025-08-07T03:35:38ZPayal Arora<br/>2019<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780674983786<br/>Network Security And Cryptography : A Self-Teaching Introductionent://SD_ILS/0/SD_ILS:2640212025-08-07T03:35:38Z2025-08-07T03:35:38ZMusa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781942270836<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-08-07T03:35:38Z2025-08-07T03:35:38ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-08-07T03:35:38Z2025-08-07T03:35:38ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792025-08-07T03:35:38Z2025-08-07T03:35:38ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>Google Cybersecurity Expert Parisa Tabrizent://SD_ILS/0/SD_ILS:2692072025-08-07T03:35:38Z2025-08-07T03:35:38ZDiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781541500075<br/>Understanding the digital world : what you need to know about computers, the internet, privacy, and securityent://SD_ILS/0/SD_ILS:2482662025-08-07T03:35:38Z2025-08-07T03:35:38ZKernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780691176543<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-08-07T03:35:38Z2025-08-07T03:35:38ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Big Data Analytics In Cybersecurityent://SD_ILS/0/SD_ILS:2640142025-08-07T03:35:38Z2025-08-07T03:35:38ZSavas, Onur Savas, Onur, editor. Deng, Julia, editor.<br/>2017<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Jabatan<br/>ISBN 9781498772129<br/>Network And Data Security For Non-Engineersent://SD_ILS/0/SD_ILS:2564402025-08-07T03:35:38Z2025-08-07T03:35:38ZGroom,Frank; Groom,Kevin; Jones,Stephan author Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781498767866<br/>Security In The Private Cloudent://SD_ILS/0/SD_ILS:2564412025-08-07T03:35:38Z2025-08-07T03:35:38ZVacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781482259551<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-08-07T03:35:38Z2025-08-07T03:35:38ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-08-07T03:35:38Z2025-08-07T03:35:38ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Introduction To Certificateless Cryptographyent://SD_ILS/0/SD_ILS:2557092025-08-07T03:35:38Z2025-08-07T03:35:38ZXiong, Hu Qin, Zhen, 1982- author. Vasilakos, Athanasios, author.<br/>2016<br/>ISBN 9781482248609<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:2195742025-08-07T03:35:38Z2025-08-07T03:35:38ZShoemaker, Dan, author. Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781285169903<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:2304002025-08-07T03:35:38Z2025-08-07T03:35:38ZSchneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119092438<br/>Cyber terrorism : policy and technical perspectiveent://SD_ILS/0/SD_ILS:2335512025-08-07T03:35:38Z2025-08-07T03:35:38ZShahrin Sahib Rabiah Ahmad Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670257464<br/>Future crimesent://SD_ILS/0/SD_ILS:2358832025-08-07T03:35:38Z2025-08-07T03:35:38ZGoodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN 9780593073667<br/>Java coding guidelines : 75 recommendations for reliable and secure programsent://SD_ILS/0/SD_ILS:2192372025-08-07T03:35:38Z2025-08-07T03:35:38ZLong, Fred, 1947- author Mohindra, Dhruv, author Seacord, Robert C., author Sutherland, Dean F., author Svoboda, David (Software security engineer), author<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321933157<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-08-07T03:35:38Z2025-08-07T03:35:38ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Information security for managersent://SD_ILS/0/SD_ILS:2067052025-08-07T03:35:38Z2025-08-07T03:35:38ZWorkman, Michael D., 1957- Phelps, Daniel C. Gathegi, John Ng’ang’a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763793012<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-08-07T03:35:38Z2025-08-07T03:35:38ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Cyberspace Survival Guide : Combating computer virusesent://SD_ILS/0/SD_ILS:2221482025-08-07T03:35:38Z2025-08-07T03:35:38ZShea, John M.<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972126<br/>Online privacyent://SD_ILS/0/SD_ILS:2224682025-08-07T03:35:38Z2025-08-07T03:35:38ZMarzolf, Julie Schwab Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972249<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-08-07T03:35:38Z2025-08-07T03:35:38ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>IT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:1877812025-08-07T03:35:38Z2025-08-07T03:35:38ZCalder, Alan Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780749464851<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-08-07T03:35:38Z2025-08-07T03:35:38ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-08-07T03:35:38Z2025-08-07T03:35:38ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>An unprogrammed life : adventures of an incurable entrepreneurent://SD_ILS/0/SD_ILS:1791702025-08-07T03:35:38Z2025-08-07T03:35:38ZSaito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118077030<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:1793012025-08-07T03:35:38Z2025-08-07T03:35:38ZWong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071744003<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:1793062025-08-07T03:35:38Z2025-08-07T03:35:38ZSullivan, Bryan, 1974- Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780071776165<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:1848012025-08-07T03:35:38Z2025-08-07T03:35:38ZBahadur, Gary Inasi, Jason De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071769051<br/>Privacy, security, and cyberspaceent://SD_ILS/0/SD_ILS:1872732025-08-07T03:35:38Z2025-08-07T03:35:38ZPlotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780816077564<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-08-07T03:35:38Z2025-08-07T03:35:38ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-08-07T03:35:38Z2025-08-07T03:35:38ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-08-07T03:35:38Z2025-08-07T03:35:38ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-08-07T03:35:38Z2025-08-07T03:35:38ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1915732025-08-07T03:35:38Z2025-08-07T03:35:38ZHoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496513<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:1915752025-08-07T03:35:38Z2025-08-07T03:35:38ZHoog, Andrew Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496599<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:1835952025-08-07T03:35:38Z2025-08-07T03:35:38ZHoward, Doug Prince, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470639559<br/>The computer : a very short introductionent://SD_ILS/0/SD_ILS:1857842025-08-07T03:35:38Z2025-08-07T03:35:38ZInce, D. (Darrel)<br/>Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this Very Short Introduction, Darrel Ince looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA--<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Muhibbah<br/>ISBN 9780199586592<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1725402025-08-07T03:35:38Z2025-08-07T03:35:38ZCanavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470916216<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-08-07T03:35:38Z2025-08-07T03:35:38ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>Microsoft Windows security : essentialsent://SD_ILS/0/SD_ILS:1765952025-08-07T03:35:38Z2025-08-07T03:35:38ZGibson, Darril.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118016848<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-08-07T03:35:38Z2025-08-07T03:35:38ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-08-07T03:35:38Z2025-08-07T03:35:38ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1414082025-08-07T03:35:38Z2025-08-07T03:35:38ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvd :ent://SD_ILS/0/SD_ILS:1932442025-08-07T03:35:38Z2025-08-07T03:35:38ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1679302025-08-07T03:35:38Z2025-08-07T03:35:38ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:1724672025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L., 1938- Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470589878<br/>IT security metrics : a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:1725412025-08-07T03:35:38Z2025-08-07T03:35:38ZHayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071713405<br/>Dear hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:1473092025-08-07T03:35:38Z2025-08-07T03:35:38ZGoldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470620069<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:1189622025-08-07T03:35:38Z2025-08-07T03:35:38ZLacey, David<br/>2009<br/>ISBN 9780470721995<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-08-07T03:35:38Z2025-08-07T03:35:38ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:1243232025-08-07T03:35:38Z2025-08-07T03:35:38ZChiesa, Raoul, 1973- Ciappi, Silvio Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781420086935<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-08-07T03:35:38Z2025-08-07T03:35:38Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-08-07T03:35:38Z2025-08-07T03:35:38ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-08-07T03:35:38Z2025-08-07T03:35:38ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>Network security fundamentalsent://SD_ILS/0/SD_ILS:956172025-08-07T03:35:38Z2025-08-07T03:35:38ZCole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Lembah Pantai<br/>ISBN 9780470101926<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:962372025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:971362025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978962025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978542025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:986982025-08-07T03:35:38Z2025-08-07T03:35:38ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The new school information securityent://SD_ILS/0/SD_ILS:999922025-08-07T03:35:38Z2025-08-07T03:35:38ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1012482025-08-07T03:35:38Z2025-08-07T03:35:38ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Schneier on securityent://SD_ILS/0/SD_ILS:1154402025-08-07T03:35:38Z2025-08-07T03:35:38ZSchneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470395356<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:1160432025-08-07T03:35:38Z2025-08-07T03:35:38ZHoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470238387<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-08-07T03:35:38Z2025-08-07T03:35:38ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>Hackers' handbook 3.0 : Includes wifi, identity theft, information warfare and web 2.0ent://SD_ILS/0/SD_ILS:1240472025-08-07T03:35:38Z2025-08-07T03:35:38ZK.Dr.<br/>2008<br/>ISBN 9781847321107<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-08-07T03:35:38Z2025-08-07T03:35:38ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1086542025-08-07T03:35:38Z2025-08-07T03:35:38ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1118852025-08-07T03:35:38Z2025-08-07T03:35:38Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780735625167<br/>Window Server 2008ent://SD_ILS/0/SD_ILS:1128172025-08-07T03:35:38Z2025-08-07T03:35:38Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1296362025-08-07T03:35:38Z2025-08-07T03:35:38Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:2173592025-08-07T03:35:38Z2025-08-07T03:35:38ZVolonino, Linda. Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN 9780470371916<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-08-07T03:35:38Z2025-08-07T03:35:38ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-08-07T03:35:38Z2025-08-07T03:35:38ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-08-07T03:35:38Z2025-08-07T03:35:38ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Network security fundamentals project manualent://SD_ILS/0/SD_ILS:956182025-08-07T03:35:38Z2025-08-07T03:35:38ZReese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470127988<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-08-07T03:35:38Z2025-08-07T03:35:38ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-08-07T03:35:38Z2025-08-07T03:35:38ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-08-07T03:35:38Z2025-08-07T03:35:38ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-08-07T03:35:38Z2025-08-07T03:35:38ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632025-08-07T03:35:38Z2025-08-07T03:35:38ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-08-07T03:35:38Z2025-08-07T03:35:38ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-08-07T03:35:38Z2025-08-07T03:35:38ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Cyber crime investigations : bridging the gaps between security professional, law enforcement and prosecutorsent://SD_ILS/0/SD_ILS:1343602025-08-07T03:35:38Z2025-08-07T03:35:38Z2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597491334<br/>Big momma's houseent://SD_ILS/0/SD_ILS:760602025-08-07T03:35:38Z2025-08-07T03:35:38ZLawrence, Martin<br/>Nonstop laughs are back in the house! Hot on the heels of the mega-hit Big Momma's House comes a super-sizes sequel that's wilder, funnier, and more enormously entertaining than the original!. In the interest of national Security, FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slamdunking Southern granny with attitude to spare. Now this granny must play nanny to three dysfunctioalupper-class kids in order to spy on their computer hacker dad. Buursting at the seams with lightearted lunacy and eye-popping sight gags, BigMomma's House 2 is loads of fun for the whole family!<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:776782025-08-07T03:35:38Z2025-08-07T03:35:38ZFadia, Ankit.<br/>2006<br/>ISBN 9781598630626<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:843602025-08-07T03:35:38Z2025-08-07T03:35:38ZStamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471738480<br/>The art of intrusion : The real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:1239522025-08-07T03:35:38Z2025-08-07T03:35:38ZMitnick, Kevin D. Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471782667<br/>E-security law and strategyent://SD_ILS/0/SD_ILS:737752025-08-07T03:35:38Z2025-08-07T03:35:38ZZaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789679626322<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-08-07T03:35:38Z2025-08-07T03:35:38ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Hardening network securityent://SD_ILS/0/SD_ILS:787542025-08-07T03:35:38Z2025-08-07T03:35:38ZMallery, John<br/>2005<br/>ISBN 9780072257038<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-08-07T03:35:38Z2025-08-07T03:35:38ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-08-07T03:35:38Z2025-08-07T03:35:38ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-08-07T03:35:38Z2025-08-07T03:35:38ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042025-08-07T03:35:38Z2025-08-07T03:35:38ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302025-08-07T03:35:38Z2025-08-07T03:35:38ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-08-07T03:35:38Z2025-08-07T03:35:38ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-08-07T03:35:38Z2025-08-07T03:35:38ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2512862025-08-07T03:35:38Z2025-08-07T03:35:38ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780072230208<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442025-08-07T03:35:38Z2025-08-07T03:35:38ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-08-07T03:35:38Z2025-08-07T03:35:38ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-08-07T03:35:38Z2025-08-07T03:35:38ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Privacy & data protectionent://SD_ILS/0/SD_ILS:1027432025-08-07T03:35:38Z2025-08-07T03:35:38ZAbu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9789839088731<br/>Privacy & data protection : a comprehensive analysis with special reference to the malaysian proposed lawent://SD_ILS/0/SD_ILS:1101282025-08-07T03:35:38Z2025-08-07T03:35:38ZAbu Bakar Munir Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789839088731<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1989502025-08-07T03:35:38Z2025-08-07T03:35:38ZSchneier, Bruce<br/>1996<br/>ISBN 9780471117094<br/>Computer Secutity managementent://SD_ILS/0/SD_ILS:1885522025-08-07T03:35:38Z2025-08-07T03:35:38ZKaren<br/>