Search Results for Computer security. - Narrowed by: 2012 SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300? 2025-11-02T11:53:32Z IT governance : an international guide to data security and ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:187781 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Calder, Alan&#160;Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780749464851<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:191583 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco)&#160;Essaaidi, Mohamed&#160;Ganzha, M. (Maria)&#160;Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607508175<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> An unprogrammed life : adventures of an incurable entrepreneur ent://SD_ILS/0/SD_ILS:179170 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Saito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118077030<br/> Security metrics : a beginner's guide ent://SD_ILS/0/SD_ILS:179301 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Wong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071744003<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Privacy, security, and cyberspace ent://SD_ILS/0/SD_ILS:187273 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Plotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780816077564<br/> Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:212280 2025-11-02T11:53:32Z 2025-11-02T11:53:32Z Cherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597499477<br/>