Search Results for Computer security - Narrowed by: DamagedSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ADAMAGED$002509Damaged$0026ps$003d300?2025-11-03T18:20:36ZData protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-11-03T18:20:36Z2025-11-03T18:20:36Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1118852025-11-03T18:20:36Z2025-11-03T18:20:36Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780735625167<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-11-03T18:20:36Z2025-11-03T18:20:36ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-11-03T18:20:36Z2025-11-03T18:20:36ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Safety net : protecting your business on the internetent://SD_ILS/0/SD_ILS:74142025-11-03T18:20:36Z2025-11-03T18:20:36ZSindell, Kathleen<br/>This book helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471079620<br/>Privacy & data protectionent://SD_ILS/0/SD_ILS:1027432025-11-03T18:20:36Z2025-11-03T18:20:36ZAbu Bakar Munir<br/>2002<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9789839088731<br/>