Search Results for Computer security management SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity$002bmanagement$0026ps$003d300? 2025-03-24T10:21:05Z Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Security information and event management (SIEM) implementation: ent://SD_ILS/0/SD_ILS:141299 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z 2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780071701099<br/> Cara mengendalikan data komputer dari kerosakan, virus, atau hilang tanpa sengaja ent://SD_ILS/0/SD_ILS:141928 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Setiawan, Bardy Joko<br/>2011&#160;2001<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ Keramat<br/>ISBN&#160;9789673712922<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:118962 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Lacey, David<br/>2009<br/>ISBN&#160;9780470721995<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:134361 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z 2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781439806920<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Data protection and information lifecycle management ent://SD_ILS/0/SD_ILS:56110 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Petrocelli, Tom<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780131927575<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Computer security: 20 things every employee should know ent://SD_ILS/0/SD_ILS:31804 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z CISSP, Ben Rothke<br/>2004<br/>ISBN&#160;9780072230833<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Computer Secutity management ent://SD_ILS/0/SD_ILS:188552 2025-03-24T10:21:05Z 2025-03-24T10:21:05Z Karen<br/>