Search Results for Computer security - Narrowed by: Perpustakaan Kuala LumpurSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dLIBRARY$002509Library$0025091$00253APKL$002509Perpustakaan$002bKuala$002bLumpur$0026ic$003dtrue$0026ps$003d300?dt=list2025-09-11T07:40:53ZIntroduction to computer securityent://SD_ILS/0/SD_ILS:445592025-09-11T07:40:53Z2025-09-11T07:40:53ZBishop, Matt<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321247445<br/>Security : Computer forensics principles and practicesent://SD_ILS/0/SD_ILS:1012582025-09-11T07:40:53Z2025-09-11T07:40:53ZVolonino, Linda Anzaldua, Reynaldo Godwin, Jana<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131547278<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352025-09-11T07:40:53Z2025-09-11T07:40:53ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352025-09-11T07:40:53Z2025-09-11T07:40:53ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-09-11T07:40:53Z2025-09-11T07:40:53ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Cybersecurity Lessons from CoVID-19ent://SD_ILS/0/SD_ILS:2857472025-09-11T07:40:53Z2025-09-11T07:40:53ZSlade, Robert<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367682699<br/>Cybersecurity in the Covid-19 pandemicent://SD_ILS/0/SD_ILS:2857482025-09-11T07:40:53Z2025-09-11T07:40:53ZOkereafor, Kenneth<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780367610913<br/>Information securityent://SD_ILS/0/SD_ILS:2808472025-09-11T07:40:53Z2025-09-11T07:40:53ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Ccsp for dummiesent://SD_ILS/0/SD_ILS:2826212025-09-11T07:40:53Z2025-09-11T07:40:53ZArthur, J. Deane<br/>2021 2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119648376<br/>Security fundamentalsent://SD_ILS/0/SD_ILS:2731482025-09-11T07:40:53Z2025-09-11T07:40:53ZPanek, Crystal<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119650669<br/>Professional hackersent://SD_ILS/0/SD_ILS:2817832025-09-11T07:40:53Z2025-09-11T07:40:53ZMorkes, Andrew<br/>2020<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781422243008<br/>Comptia pentest certification for dummiesent://SD_ILS/0/SD_ILS:2826182025-09-11T07:40:53Z2025-09-11T07:40:53ZClarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119633556<br/>The Next Billion User Digitsl Life Beyond The Westent://SD_ILS/0/SD_ILS:2709962025-09-11T07:40:53Z2025-09-11T07:40:53ZPayal Arora<br/>2019<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780674983786<br/>KESEDARAN KESELAMATAN SIBERent://SD_ILS/0/SD_ILS:2809152025-09-11T07:40:53Z2025-09-11T07:40:53ZMasnizah Mohd Masnizah Mohd., editor. Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674127176<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-09-11T07:40:53Z2025-09-11T07:40:53ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-09-11T07:40:53Z2025-09-11T07:40:53ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-09-11T07:40:53Z2025-09-11T07:40:53ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Network And Data Security For Non-Engineersent://SD_ILS/0/SD_ILS:2564402025-09-11T07:40:53Z2025-09-11T07:40:53ZGroom,Frank; Groom,Kevin; Jones,Stephan author Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781498767866<br/>Security In The Private Cloudent://SD_ILS/0/SD_ILS:2564412025-09-11T07:40:53Z2025-09-11T07:40:53ZVacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781482259551<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-09-11T07:40:53Z2025-09-11T07:40:53ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:2195742025-09-11T07:40:53Z2025-09-11T07:40:53ZShoemaker, Dan, author. Sigler, Kenneth, author<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781285169903<br/>Kisah benar cyber 999 : kompilasi coretan hidup di alam siberent://SD_ILS/0/SD_ILS:2276472025-09-11T07:40:53Z2025-09-11T07:40:53Z2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Lembah Pantai Perpustakaan Medan Idaman<br/>ISBN 9789678606134<br/>Cyber terrorism : policy and technical perspectiveent://SD_ILS/0/SD_ILS:2335512025-09-11T07:40:53Z2025-09-11T07:40:53ZShahrin Sahib Rabiah Ahmad Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670257464<br/>Java coding guidelines : 75 recommendations for reliable and secure programsent://SD_ILS/0/SD_ILS:2192372025-09-11T07:40:53Z2025-09-11T07:40:53ZLong, Fred, 1947- author Mohindra, Dhruv, author Seacord, Robert C., author Sutherland, Dean F., author Svoboda, David (Software security engineer), author<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321933157<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-09-11T07:40:53Z2025-09-11T07:40:53ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Information security for managersent://SD_ILS/0/SD_ILS:2067052025-09-11T07:40:53Z2025-09-11T07:40:53ZWorkman, Michael D., 1957- Phelps, Daniel C. Gathegi, John Ng’ang’a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763793012<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-09-11T07:40:53Z2025-09-11T07:40:53ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-09-11T07:40:53Z2025-09-11T07:40:53ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>IT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:1877812025-09-11T07:40:53Z2025-09-11T07:40:53ZCalder, Alan Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780749464851<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-09-11T07:40:53Z2025-09-11T07:40:53ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-09-11T07:40:53Z2025-09-11T07:40:53ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>An unprogrammed life : adventures of an incurable entrepreneurent://SD_ILS/0/SD_ILS:1791702025-09-11T07:40:53Z2025-09-11T07:40:53ZSaito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118077030<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:1793012025-09-11T07:40:53Z2025-09-11T07:40:53ZWong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071744003<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:1793062025-09-11T07:40:53Z2025-09-11T07:40:53ZSullivan, Bryan, 1974- Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780071776165<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:1848012025-09-11T07:40:53Z2025-09-11T07:40:53ZBahadur, Gary Inasi, Jason De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071769051<br/>Privacy, security, and cyberspaceent://SD_ILS/0/SD_ILS:1872732025-09-11T07:40:53Z2025-09-11T07:40:53ZPlotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780816077564<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-09-11T07:40:53Z2025-09-11T07:40:53ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-09-11T07:40:53Z2025-09-11T07:40:53ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-09-11T07:40:53Z2025-09-11T07:40:53ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>Keselamatan komputer dan internet:ent://SD_ILS/0/SD_ILS:1395712025-09-11T07:40:53Z2025-09-11T07:40:53ZZabri Zakaria Noor Azilawati Mohd Sabda<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Kuala Lumpur, Cawangan Sri Sabah Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak<br/>ISBN 9789833859917<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-09-11T07:40:53Z2025-09-11T07:40:53ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>Security information and event management (SIEM) implementation:ent://SD_ILS/0/SD_ILS:1412992025-09-11T07:40:53Z2025-09-11T07:40:53Z2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071701099<br/>Handbook of eID security: concepts, practical experiences, technologiesent://SD_ILS/0/SD_ILS:1413232025-09-11T07:40:53Z2025-09-11T07:40:53ZFumy, Walter<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9783895783791<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-09-11T07:40:53Z2025-09-11T07:40:53ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengajaent://SD_ILS/0/SD_ILS:1419282025-09-11T07:40:53Z2025-09-11T07:40:53ZSetiawan, Bardy Joko<br/>2011 2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Pustaka KL @ Keramat<br/>ISBN 9789673712922<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1915732025-09-11T07:40:53Z2025-09-11T07:40:53ZHoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496513<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:1915752025-09-11T07:40:53Z2025-09-11T07:40:53ZHoog, Andrew Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496599<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1725402025-09-11T07:40:53Z2025-09-11T07:40:53ZCanavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470916216<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-09-11T07:40:53Z2025-09-11T07:40:53ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>Microsoft Windows security : essentialsent://SD_ILS/0/SD_ILS:1765952025-09-11T07:40:53Z2025-09-11T07:40:53ZGibson, Darril.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118016848<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:1476302025-09-11T07:40:53Z2025-09-11T07:40:53ZGrama, Joanna Lyn.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791858<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-09-11T07:40:53Z2025-09-11T07:40:53ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1414082025-09-11T07:40:53Z2025-09-11T07:40:53ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1679302025-09-11T07:40:53Z2025-09-11T07:40:53ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:1724672025-09-11T07:40:53Z2025-09-11T07:40:53ZKrutz, Ronald L., 1938- Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470589878<br/>IT security metrics : a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:1725412025-09-11T07:40:53Z2025-09-11T07:40:53ZHayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071713405<br/>Dear hacker : letters to the editor of 2600ent://SD_ILS/0/SD_ILS:1473092025-09-11T07:40:53Z2025-09-11T07:40:53ZGoldstein, Emmanuel J.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470620069<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-09-11T07:40:53Z2025-09-11T07:40:53ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Profiling hackers : the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:1243232025-09-11T07:40:53Z2025-09-11T07:40:53ZChiesa, Raoul, 1973- Ciappi, Silvio Ducci, Stefania<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781420086935<br/>Teknik menggempur virusent://SD_ILS/0/SD_ILS:1317312025-09-11T07:40:53Z2025-09-11T07:40:53ZMuhammad Haiqal<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789675065750<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-09-11T07:40:53Z2025-09-11T07:40:53Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-09-11T07:40:53Z2025-09-11T07:40:53ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-09-11T07:40:53Z2025-09-11T07:40:53ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>Network security fundamentalsent://SD_ILS/0/SD_ILS:956172025-09-11T07:40:53Z2025-09-11T07:40:53ZCole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Lembah Pantai<br/>ISBN 9780470101926<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:962372025-09-11T07:40:53Z2025-09-11T07:40:53ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:971362025-09-11T07:40:53Z2025-09-11T07:40:53ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780470135921<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1012482025-09-11T07:40:53Z2025-09-11T07:40:53ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Schneier on securityent://SD_ILS/0/SD_ILS:1154402025-09-11T07:40:53Z2025-09-11T07:40:53ZSchneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470395356<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:1160432025-09-11T07:40:53Z2025-09-11T07:40:53ZHoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470238387<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-09-11T07:40:53Z2025-09-11T07:40:53ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-09-11T07:40:53Z2025-09-11T07:40:53ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Cisco firewall video mentorent://SD_ILS/0/SD_ILS:1086542025-09-11T07:40:53Z2025-09-11T07:40:53ZHucaby, David<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201981<br/>Window Server 2008ent://SD_ILS/0/SD_ILS:1128172025-09-11T07:40:53Z2025-09-11T07:40:53Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1296362025-09-11T07:40:53Z2025-09-11T07:40:53Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-09-11T07:40:53Z2025-09-11T07:40:53ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-09-11T07:40:53Z2025-09-11T07:40:53ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-09-11T07:40:53Z2025-09-11T07:40:53ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-09-11T07:40:53Z2025-09-11T07:40:53ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-09-11T07:40:53Z2025-09-11T07:40:53ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632025-09-11T07:40:53Z2025-09-11T07:40:53ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Cyber crime investigations : bridging the gaps between security professional, law enforcement and prosecutorsent://SD_ILS/0/SD_ILS:1343602025-09-11T07:40:53Z2025-09-11T07:40:53Z2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597491334<br/>Data protection and information lifecycle managementent://SD_ILS/0/SD_ILS:561102025-09-11T07:40:53Z2025-09-11T07:40:53ZPetrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131927575<br/>Big momma's houseent://SD_ILS/0/SD_ILS:760602025-09-11T07:40:53Z2025-09-11T07:40:53ZLawrence, Martin<br/>Nonstop laughs are back in the house! Hot on the heels of the mega-hit Big Momma's House comes a super-sizes sequel that's wilder, funnier, and more enormously entertaining than the original!. In the interest of national Security, FBI agent Malcolm Turner goes back undercover as Big Momma, a slick-talking, slamdunking Southern granny with attitude to spare. Now this granny must play nanny to three dysfunctioalupper-class kids in order to spy on their computer hacker dad. Buursting at the seams with lightearted lunacy and eye-popping sight gags, BigMomma's House 2 is loads of fun for the whole family!<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>Information security : principles and practicesent://SD_ILS/0/SD_ILS:843602025-09-11T07:40:53Z2025-09-11T07:40:53ZStamp, Mark<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471738480<br/>The art of intrusion : The real stories behind the exploits of hackers, intruders & deceiversent://SD_ILS/0/SD_ILS:1239522025-09-11T07:40:53Z2025-09-11T07:40:53ZMitnick, Kevin D. Simon, William L.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471782667<br/>Surat pekelililing am bilangan 4 tahun 2006 : pengurusan pengendalian insiden keselamatan teknologi maklumat dan komunikasi (ICT) sektor awament://SD_ILS/0/SD_ILS:1293092025-09-11T07:40:53Z2025-09-11T07:40:53ZJabatan Perdana Menteri<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-09-11T07:40:53Z2025-09-11T07:40:53ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042025-09-11T07:40:53Z2025-09-11T07:40:53Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-09-11T07:40:53Z2025-09-11T07:40:53ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:552832025-09-11T07:40:53Z2025-09-11T07:40:53ZCarvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321200983<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-09-11T07:40:53Z2025-09-11T07:40:53ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>E-security law and strategyent://SD_ILS/0/SD_ILS:737752025-09-11T07:40:53Z2025-09-11T07:40:53ZZaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789679626322<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-09-11T07:40:53Z2025-09-11T07:40:53ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-09-11T07:40:53Z2025-09-11T07:40:53ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>The business case for network security : advocacy, governance and ROIent://SD_ILS/0/SD_ILS:440642025-09-11T07:40:53Z2025-09-11T07:40:53ZPaquet, Catherine Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201219<br/>High-tech crimes revealed : cyberwar stories from the digital frontent://SD_ILS/0/SD_ILS:440872025-09-11T07:40:53Z2025-09-11T07:40:53ZBranigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321218735<br/>Troubleshooting linux firewallsent://SD_ILS/0/SD_ILS:443062025-09-11T07:40:53Z2025-09-11T07:40:53ZShinn, Michael Shinn, Scott<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321227232<br/>Internet denial of service : attack and defence mechanisment://SD_ILS/0/SD_ILS:443602025-09-11T07:40:53Z2025-09-11T07:40:53ZMirkovic, Jelena Dietrich, Sven Dittrich, David<br/>2005 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131475731<br/>The tao of network security monitoring : beyond instrusion detectionent://SD_ILS/0/SD_ILS:452762025-09-11T07:40:53Z2025-09-11T07:40:53ZBejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321246776<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-09-11T07:40:53Z2025-09-11T07:40:53ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-09-11T07:40:53Z2025-09-11T07:40:53ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302025-09-11T07:40:53Z2025-09-11T07:40:53ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-09-11T07:40:53Z2025-09-11T07:40:53ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Linux securityent://SD_ILS/0/SD_ILS:379162025-09-11T07:40:53Z2025-09-11T07:40:53Z2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861251554<br/>Exploiting software : how to break codeent://SD_ILS/0/SD_ILS:419922025-09-11T07:40:53Z2025-09-11T07:40:53ZHoglund, Greg<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201786958<br/>Enterprise java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:436802025-09-11T07:40:53Z2025-09-11T07:40:53ZPistoia, Marco Nagaratnam, Nataraj Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321118899<br/>Wi-Fooent://SD_ILS/0/SD_ILS:442802025-09-11T07:40:53Z2025-09-11T07:40:53ZVladimirov, Andrew A. Gavrilenko, Konstantin V. Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321202178<br/>The .NET developer's guide to Windows securityent://SD_ILS/0/SD_ILS:443022025-09-11T07:40:53Z2025-09-11T07:40:53ZBrown, Keith<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321228352<br/>Forensic discoveryent://SD_ILS/0/SD_ILS:443612025-09-11T07:40:53Z2025-09-11T07:40:53ZFarmer, Dan Venema, Wietse<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780201634976<br/>TechTV security alert : stories of real people protecting themselves from identity theft, scams and virusesent://SD_ILS/0/SD_ILS:445022025-09-11T07:40:53Z2025-09-11T07:40:53ZWorley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735713529<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862025-09-11T07:40:53Z2025-09-11T07:40:53ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-09-11T07:40:53Z2025-09-11T07:40:53ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442025-09-11T07:40:53Z2025-09-11T07:40:53ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-09-11T07:40:53Z2025-09-11T07:40:53ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:214922025-09-11T07:40:53Z2025-09-11T07:40:53ZCampbell, Paul Calvert, Ben Boswell, Steven<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780619120177<br/>Inside the security mind : making the tough decisionsent://SD_ILS/0/SD_ILS:452702025-09-11T07:40:53Z2025-09-11T07:40:53ZDay, Kevin<br/>2003<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131118294<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:565462025-09-11T07:40:53Z2025-09-11T07:40:53Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Protect your home PC : hackers, viruses, and privacyent://SD_ILS/0/SD_ILS:566642025-09-11T07:40:53Z2025-09-11T07:40:53Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781577292876<br/>Writing secure codeent://SD_ILS/0/SD_ILS:50102025-09-11T07:40:53Z2025-09-11T07:40:53ZHoward, Michael LeBlanc, David<br/>2002<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780735615885<br/>Safety net : protecting your business on the internetent://SD_ILS/0/SD_ILS:74142025-09-11T07:40:53Z2025-09-11T07:40:53ZSindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471079620<br/>Data networks : routing, security and performance optimizationent://SD_ILS/0/SD_ILS:128132025-09-11T07:40:53Z2025-09-11T07:40:53ZKenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781555582715<br/>The secured enterpriseent://SD_ILS/0/SD_ILS:160742025-09-11T07:40:53Z2025-09-11T07:40:53ZProctor, Paul E. Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780130619068<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-09-11T07:40:53Z2025-09-11T07:40:53ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>Hack proofing XMLent://SD_ILS/0/SD_ILS:220812025-09-11T07:40:53Z2025-09-11T07:40:53Z2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781931836500<br/>Privacy & data protection : a comprehensive analysis with special reference to the malaysian proposed lawent://SD_ILS/0/SD_ILS:1101282025-09-11T07:40:53Z2025-09-11T07:40:53ZAbu Bakar Munir Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789839088731<br/>IPSEC securing VPNsent://SD_ILS/0/SD_ILS:27022025-09-11T07:40:53Z2025-09-11T07:40:53ZDavis, Carlton R.<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072017571<br/>Enterprise security with EJB and COBRAent://SD_ILS/0/SD_ILS:73342025-09-11T07:40:53Z2025-09-11T07:40:53ZHartman, Bret Flinn, Donald J. Beznosov, Konstantin<br/>2001<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471401315<br/>