Search Results for Computer security -- - Narrowed by: 2005SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$002b$002b--$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ps$003d300?dt=list2026-02-05T19:07:21ZComputer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892026-02-05T19:07:21Z2026-02-05T19:07:21ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372026-02-05T19:07:21Z2026-02-05T19:07:21ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601852026-02-05T19:07:21Z2026-02-05T19:07:21ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332026-02-05T19:07:21Z2026-02-05T19:07:21ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042026-02-05T19:07:21Z2026-02-05T19:07:21Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382026-02-05T19:07:21Z2026-02-05T19:07:21ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:552832026-02-05T19:07:21Z2026-02-05T19:07:21ZCarvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321200983<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972026-02-05T19:07:21Z2026-02-05T19:07:21Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432026-02-05T19:07:21Z2026-02-05T19:07:21ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>E-security law and strategyent://SD_ILS/0/SD_ILS:737752026-02-05T19:07:21Z2026-02-05T19:07:21ZZaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789679626322<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682026-02-05T19:07:21Z2026-02-05T19:07:21ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Hardening network securityent://SD_ILS/0/SD_ILS:787542026-02-05T19:07:21Z2026-02-05T19:07:21ZMallery, John<br/>2005<br/>ISBN 9780072257038<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632026-02-05T19:07:21Z2026-02-05T19:07:21ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>The business case for network security : advocacy, governance and ROIent://SD_ILS/0/SD_ILS:440642026-02-05T19:07:21Z2026-02-05T19:07:21ZPaquet, Catherine Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201219<br/>High-tech crimes revealed : cyberwar stories from the digital frontent://SD_ILS/0/SD_ILS:440872026-02-05T19:07:21Z2026-02-05T19:07:21ZBranigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321218735<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:442812026-02-05T19:07:21Z2026-02-05T19:07:21ZCarvey, Harlan<br/>2005<br/>ISBN 9780321200983<br/>Troubleshooting linux firewallsent://SD_ILS/0/SD_ILS:443062026-02-05T19:07:21Z2026-02-05T19:07:21ZShinn, Michael Shinn, Scott<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321227232<br/>Internet denial of service : attack and defence mechanisment://SD_ILS/0/SD_ILS:443602026-02-05T19:07:21Z2026-02-05T19:07:21ZMirkovic, Jelena Dietrich, Sven Dittrich, David<br/>2005 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131475731<br/>The tao of network security monitoring : beyond instrusion detectionent://SD_ILS/0/SD_ILS:452762026-02-05T19:07:21Z2026-02-05T19:07:21ZBejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321246776<br/>Network securityent://SD_ILS/0/SD_ILS:476792026-02-05T19:07:21Z2026-02-05T19:07:21ZPardoe, Terry D. Snyder, Gordon F.<br/>2005<br/>ISBN 9781401882143<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822026-02-05T19:07:21Z2026-02-05T19:07:21ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012026-02-05T19:07:21Z2026-02-05T19:07:21ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032026-02-05T19:07:21Z2026-02-05T19:07:21ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982026-02-05T19:07:21Z2026-02-05T19:07:21ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042026-02-05T19:07:21Z2026-02-05T19:07:21ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302026-02-05T19:07:21Z2026-02-05T19:07:21ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Extreme exploits : advanced defenses against hardcore hacksent://SD_ILS/0/SD_ILS:618652026-02-05T19:07:21Z2026-02-05T19:07:21ZOppleman, Victor<br/>2005<br/>ISBN 9780072259551<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902026-02-05T19:07:21Z2026-02-05T19:07:21ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>