Search Results for Computer security. - Narrowed by: Risk managementSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Risk$002bmanagement$002509Risk$002bmanagement$0026ps$003d300?2025-12-30T13:35:49ZRisk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-12-30T13:35:49Z2025-12-30T13:35:49ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-12-30T13:35:49Z2025-12-30T13:35:49ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-12-30T13:35:49Z2025-12-30T13:35:49ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>