Search Results for Crimes - Narrowed by: Computer security. SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dCrimes$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2025-12-13T13:19:15Z Future crimes ent://SD_ILS/0/SD_ILS:235883 2025-12-13T13:19:15Z 2025-12-13T13:19:15Z Goodman, Marc<br/>2015<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9780593073667<br/> Cyber terrorism : policy and technical perspective ent://SD_ILS/0/SD_ILS:233551 2025-12-13T13:19:15Z 2025-12-13T13:19:15Z Shahrin Sahib&#160;Rabiah Ahmad&#160;Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Muhibbah&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670257464<br/> Cyber security culture : counteracting cyber threats through organizational learning and training ent://SD_ILS/0/SD_ILS:202311 2025-12-13T13:19:15Z 2025-12-13T13:19:15Z Trim, Peter&#160;Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781409456940<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-12-13T13:19:15Z 2025-12-13T13:19:15Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:217359 2025-12-13T13:19:15Z 2025-12-13T13:19:15Z Volonino, Linda.&#160;Anzaldua, Reynaldo.<br/>2008<br/>Perpustakaan Jabatan<br/>ISBN&#160;9780470371916<br/>