Search Results for Computing security - Narrowed by: Open shelfSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dComputing$002bsecurity$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AOPENSHELF$002509Open$002bshelf$0026ic$003dtrue$0026ps$003d300?2025-12-11T11:19:31ZCloud computing : SaaS, PaaS, IaaS, virtualizatin, business models, mobile, security and moreent://SD_ILS/0/SD_ILS:1868372025-12-11T11:19:31Z2025-12-11T11:19:31ZJamsa, Kris A.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781449647391<br/>Ccsp for dummiesent://SD_ILS/0/SD_ILS:2826212025-12-11T11:19:31Z2025-12-11T11:19:31ZArthur, J. Deane<br/>2021 2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119648376<br/>Cyberspace Survival Guide : Combating computer virusesent://SD_ILS/0/SD_ILS:2221482025-12-11T11:19:31Z2025-12-11T11:19:31ZShea, John M.<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972126<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:2122802025-12-11T11:19:31Z2025-12-11T11:19:31ZCherry, Denny.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597499477<br/>The computer : a very short introductionent://SD_ILS/0/SD_ILS:1857842025-12-11T11:19:31Z2025-12-11T11:19:31ZInce, D. (Darrel)<br/>Computers have changed so much since the room-filling, bulky magnetic tape running monsters of the mid 20th century. They now form a vital part of most people's lives. And they are more ubiquitous than might be thought - you may have more than 30 computers in your home: not just the desktop and laptop but think of the television, the fridge, the microwave. But what is the basic nature of the modern computer? How does it work? How has it been possible to squeeze so much power into increasingly small machines? And what will the next generations of computers look like? In this Very Short Introduction, Darrel Ince looks at the basic concepts behind all computers; the changes in hardware and software that allowed computers to become so small and commonplace; the challenges produced by the computer revolution - especially whole new modes of cybercrime and security issues; the Internet and the advent of 'cloud computing'; and the promise of whole new horizons opening up with quantum computing, and even computing using DNA--<br/>2011<br/>Perpustakaan Kuala Lumpur, Cawangan Muhibbah<br/>ISBN 9780199586592<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-12-11T11:19:31Z2025-12-11T11:19:31ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>Mobile application securityent://SD_ILS/0/SD_ILS:1864152025-12-11T11:19:31Z2025-12-11T11:19:31ZDwivedi, Himanshu Clark, Chris, 1980- Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071633567<br/>Data networks : routing, security and performance optimizationent://SD_ILS/0/SD_ILS:128132025-12-11T11:19:31Z2025-12-11T11:19:31ZKenyon, Tony<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781555582715<br/>