Search Results for Computer security. - Narrowed by: 2005SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026ic$003dtrue$0026ps$003d300?2025-11-04T23:45:54ZComputer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-11-04T23:45:54Z2025-11-04T23:45:54ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372025-11-04T23:45:54Z2025-11-04T23:45:54ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601852025-11-04T23:45:54Z2025-11-04T23:45:54ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332025-11-04T23:45:54Z2025-11-04T23:45:54ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042025-11-04T23:45:54Z2025-11-04T23:45:54Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-11-04T23:45:54Z2025-11-04T23:45:54ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:552832025-11-04T23:45:54Z2025-11-04T23:45:54ZCarvey, Harlan<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321200983<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972025-11-04T23:45:54Z2025-11-04T23:45:54Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-11-04T23:45:54Z2025-11-04T23:45:54ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>E-security law and strategyent://SD_ILS/0/SD_ILS:737752025-11-04T23:45:54Z2025-11-04T23:45:54ZZaid Hamzah<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789679626322<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-11-04T23:45:54Z2025-11-04T23:45:54ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Hardening network securityent://SD_ILS/0/SD_ILS:787542025-11-04T23:45:54Z2025-11-04T23:45:54ZMallery, John<br/>2005<br/>ISBN 9780072257038<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-11-04T23:45:54Z2025-11-04T23:45:54ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>The business case for network security : advocacy, governance and ROIent://SD_ILS/0/SD_ILS:440642025-11-04T23:45:54Z2025-11-04T23:45:54ZPaquet, Catherine Saxe, Warren<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781587201219<br/>High-tech crimes revealed : cyberwar stories from the digital frontent://SD_ILS/0/SD_ILS:440872025-11-04T23:45:54Z2025-11-04T23:45:54ZBranigan, Steven<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321218735<br/>Windows forensics and incident recoveryent://SD_ILS/0/SD_ILS:442812025-11-04T23:45:54Z2025-11-04T23:45:54ZCarvey, Harlan<br/>2005<br/>ISBN 9780321200983<br/>Troubleshooting linux firewallsent://SD_ILS/0/SD_ILS:443062025-11-04T23:45:54Z2025-11-04T23:45:54ZShinn, Michael Shinn, Scott<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321227232<br/>Internet denial of service : attack and defence mechanisment://SD_ILS/0/SD_ILS:443602025-11-04T23:45:54Z2025-11-04T23:45:54ZMirkovic, Jelena Dietrich, Sven Dittrich, David<br/>2005 2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131475731<br/>The tao of network security monitoring : beyond instrusion detectionent://SD_ILS/0/SD_ILS:452762025-11-04T23:45:54Z2025-11-04T23:45:54ZBejtlich, Richard<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321246776<br/>Network securityent://SD_ILS/0/SD_ILS:476792025-11-04T23:45:54Z2025-11-04T23:45:54ZPardoe, Terry D. Snyder, Gordon F.<br/>2005<br/>ISBN 9781401882143<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822025-11-04T23:45:54Z2025-11-04T23:45:54ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-11-04T23:45:54Z2025-11-04T23:45:54ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-11-04T23:45:54Z2025-11-04T23:45:54ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-11-04T23:45:54Z2025-11-04T23:45:54ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042025-11-04T23:45:54Z2025-11-04T23:45:54ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302025-11-04T23:45:54Z2025-11-04T23:45:54ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Extreme exploits : advanced defenses against hardcore hacksent://SD_ILS/0/SD_ILS:618652025-11-04T23:45:54Z2025-11-04T23:45:54ZOppleman, Victor<br/>2005<br/>ISBN 9780072259551<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-11-04T23:45:54Z2025-11-04T23:45:54ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>