Search Results for Information networks. - Narrowed by: Computer security. SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dInformation$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2025-03-23T03:40:53Z Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2025-03-23T03:40:53Z 2025-03-23T03:40:53Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>