Search Results for Information networks. - Narrowed by: Computer security.SirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dInformation$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-03-23T03:40:53ZManagement Of Information Securityent://SD_ILS/0/SD_ILS:2612542025-03-23T03:40:53Z2025-03-23T03:40:53ZWhitman, Michael E., Mattford, Herbert J., author.<br/>2019<br/>ISBN 9781337405713<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-03-23T03:40:53Z2025-03-23T03:40:53ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-03-23T03:40:53Z2025-03-23T03:40:53ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-03-23T03:40:53Z2025-03-23T03:40:53ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-03-23T03:40:53Z2025-03-23T03:40:53ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-03-23T03:40:53Z2025-03-23T03:40:53ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-03-23T03:40:53Z2025-03-23T03:40:53ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-03-23T03:40:53Z2025-03-23T03:40:53ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-03-23T03:40:53Z2025-03-23T03:40:53ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>