Search Results for Computer security - Narrowed by: Data protectionSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list2025-08-06T13:12:24ZSimple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1239352025-08-06T13:12:24Z2025-08-06T13:12:24ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Simple computer security : Disinfect your PCent://SD_ILS/0/SD_ILS:1246352025-08-06T13:12:24Z2025-08-06T13:12:24ZGeier, Eric Geier, Jim<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470068540<br/>Information securityent://SD_ILS/0/SD_ILS:2808472025-08-06T13:12:24Z2025-08-06T13:12:24ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-08-06T13:12:24Z2025-08-06T13:12:24ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792025-08-06T13:12:24Z2025-08-06T13:12:24ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-08-06T13:12:24Z2025-08-06T13:12:24ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-08-06T13:12:24Z2025-08-06T13:12:24ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-08-06T13:12:24Z2025-08-06T13:12:24Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-08-06T13:12:24Z2025-08-06T13:12:24ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-08-06T13:12:24Z2025-08-06T13:12:24ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:896632025-08-06T13:12:24Z2025-08-06T13:12:24ZSchou, Corey Shoemaker, Dan<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780072255249<br/>Data protection and information lifecycle managementent://SD_ILS/0/SD_ILS:561102025-08-06T13:12:24Z2025-08-06T13:12:24ZPetrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131927575<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-08-06T13:12:24Z2025-08-06T13:12:24ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-08-06T13:12:24Z2025-08-06T13:12:24ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042025-08-06T13:12:24Z2025-08-06T13:12:24ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-08-06T13:12:24Z2025-08-06T13:12:24ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2512862025-08-06T13:12:24Z2025-08-06T13:12:24ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780072230208<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442025-08-06T13:12:24Z2025-08-06T13:12:24ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-08-06T13:12:24Z2025-08-06T13:12:24ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>The secured enterpriseent://SD_ILS/0/SD_ILS:160742025-08-06T13:12:24Z2025-08-06T13:12:24ZProctor, Paul E. Byrnes, F. Christian<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780130619068<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552025-08-06T13:12:24Z2025-08-06T13:12:24ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>