Search Results for Computer security - Narrowed by: Operating systems (Computers)SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Operating$002bsystems$002b$002528Computers$002529$002509Operating$002bsystems$002b$002528Computers$002529$0026ps$003d300?2025-11-05T11:39:00ZSecurity strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-11-05T11:39:00Z2025-11-05T11:39:00ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-11-05T11:39:00Z2025-11-05T11:39:00ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-11-05T11:39:00Z2025-11-05T11:39:00ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:440842025-11-05T11:39:00Z2025-11-05T11:39:00ZPalmer, Brandon<br/>2004<br/>ISBN 9780321193667<br/>