Search Results for Computer security. - Narrowed by: 2012SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092012$0025092012$0026ps$003d300?2025-11-02T11:53:32ZIT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:1877812025-11-02T11:53:32Z2025-11-02T11:53:32ZCalder, Alan Steve Watkins<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780749464851<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-11-02T11:53:32Z2025-11-02T11:53:32ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-11-02T11:53:32Z2025-11-02T11:53:32ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>An unprogrammed life : adventures of an incurable entrepreneurent://SD_ILS/0/SD_ILS:1791702025-11-02T11:53:32Z2025-11-02T11:53:32ZSaito, William H.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118077030<br/>Security metrics : a beginner's guideent://SD_ILS/0/SD_ILS:1793012025-11-02T11:53:32Z2025-11-02T11:53:32ZWong, Caroline<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071744003<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:1793062025-11-02T11:53:32Z2025-11-02T11:53:32ZSullivan, Bryan, 1974- Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780071776165<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:1848012025-11-02T11:53:32Z2025-11-02T11:53:32ZBahadur, Gary Inasi, Jason De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071769051<br/>Privacy, security, and cyberspaceent://SD_ILS/0/SD_ILS:1872732025-11-02T11:53:32Z2025-11-02T11:53:32ZPlotkin, Robert, 1971-<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780816077564<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-11-02T11:53:32Z2025-11-02T11:53:32ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-11-02T11:53:32Z2025-11-02T11:53:32ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-11-02T11:53:32Z2025-11-02T11:53:32ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>