Search Results for Security measures - Narrowed by: English SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300? 2025-11-04T06:39:30Z Information security ent://SD_ILS/0/SD_ILS:280847 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Noor Suhana Sulaiman&#160;Alsaggoff, Syed Zulkarnain Syed Idrus, author.&#160;Amiza Amir, author&#160;Wan Aniul Alyani Wan Mohamed, author.&#160;Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789670922997<br/> Ccsp for dummies ent://SD_ILS/0/SD_ILS:282621 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Arthur, J. Deane<br/>2021&#160;2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119648376<br/> Comptia pentest certification for dummies ent://SD_ILS/0/SD_ILS:282618 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Clarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781119633556<br/> A Garfield guide to posting online : pause before you post ent://SD_ILS/0/SD_ILS:303002 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Scott Nickel<br/>2020<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN&#160;9781541572799<br/> The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic &amp; Technological Perspectives ent://SD_ILS/0/SD_ILS:261088 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Sakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN&#160;9789674405939<br/> Internet Content Regulation Contemporary Legal And Regulatory Issues In The Changing Digital Landscape ent://SD_ILS/0/SD_ILS:261092 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Mahyuddin Daud<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Pustaka KL @ PPR Pinggiran Bukit Jalil&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789674910198<br/> Management Of Information Security ent://SD_ILS/0/SD_ILS:261254 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Whitman, Michael E.,&#160;Mattford, Herbert J., author.<br/>2019<br/>ISBN&#160;9781337405713<br/> Cyber Risk Leaders ent://SD_ILS/0/SD_ILS:274946 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Shamane Tan<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN&#160;9780648595311<br/> Exploring Best Practice For Home Warranty System ent://SD_ILS/0/SD_ILS:271812 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Abdul Aziz Hussin&#160;Nor' Aini Yusof&#160;Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Lembah Pantai&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789674613327<br/> Network Security And Cryptography : A Self-Teaching Introduction ent://SD_ILS/0/SD_ILS:264021 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Musa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781942270836<br/> Physical Security And Protection Of Identity ent://SD_ILS/0/SD_ILS:272730 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Zaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9789672145011<br/> Principles Of Information Security : Sixth Edition ent://SD_ILS/0/SD_ILS:255145 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Whitman, Michael E&#160;Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781337102063<br/> Understanding Cyber Risk : Protecting Your Corporate Assets ent://SD_ILS/0/SD_ILS:267279 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Koehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN&#160;9781472477798<br/> Google Cybersecurity Expert Parisa Tabriz ent://SD_ILS/0/SD_ILS:269207 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z DiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781541500075<br/> Staying safe online ent://SD_ILS/0/SD_ILS:270779 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Brundle, Harriet<br/>2018<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN&#160;9781489678942<br/> Understanding the digital world : what you need to know about computers, the internet, privacy, and security ent://SD_ILS/0/SD_ILS:248266 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Kernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780691176543<br/> The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data ent://SD_ILS/0/SD_ILS:253495 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Mitnick,Kevin D; Vamosi Robert&#160;Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780316380508<br/> Network And Data Security For Non-Engineers ent://SD_ILS/0/SD_ILS:256440 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Groom,Frank; Groom,Kevin;&#160;Jones,Stephan author&#160;Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781498767866<br/> Security In The Private Cloud ent://SD_ILS/0/SD_ILS:256441 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Vacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781482259551<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Wireless and mobile device security ent://SD_ILS/0/SD_ILS:240522 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Doherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284059274<br/> Elementary information security ent://SD_ILS/0/SD_ILS:240702 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Smith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284055931<br/> Saving lives and staying alive : humanitarian security in the age of risk management ent://SD_ILS/0/SD_ILS:242865 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Neuman, Michael&#160;Weissman, Fabrice, 1969- editor<br/>2016<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781849046510<br/> Claim Your Domain - And Own Your Online Presence ent://SD_ILS/0/SD_ILS:254605 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Watters, Audrey<br/>2016<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781942496236<br/> Mobile phone safety ent://SD_ILS/0/SD_ILS:263870 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Kathy Allen<br/>2016<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781474724333<br/> Safe Social Networking ent://SD_ILS/0/SD_ILS:263871 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Heather E Schwartz<br/>2016<br/>Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781474724302<br/> Introduction To Certificateless Cryptography ent://SD_ILS/0/SD_ILS:255709 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Xiong, Hu&#160;Qin, Zhen, 1982- author.&#160;Vasilakos, Athanasios, author.<br/>2016<br/>ISBN&#160;9781482248609<br/> Secrets and lies : digital security in a networked world ent://SD_ILS/0/SD_ILS:230400 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Schneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781119092438<br/> Library security : better communication, safer facilities ent://SD_ILS/0/SD_ILS:232506 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Albrecht, Steve<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780838913307<br/> Technology disaster response and recovery planning : a LITA guide ent://SD_ILS/0/SD_ILS:237790 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Mallery, Mary, editor<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780838913154<br/> Passwords and security ent://SD_ILS/0/SD_ILS:232188 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Minton, Eric<br/>2014<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781477729427<br/> Facebook safety and privacy ent://SD_ILS/0/SD_ILS:233169 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Brown, Tracy<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781448895809<br/> Cyber security culture : counteracting cyber threats through organizational learning and training ent://SD_ILS/0/SD_ILS:202311 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Trim, Peter&#160;Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781409456940<br/> Information security for managers ent://SD_ILS/0/SD_ILS:206705 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Workman, Michael D., 1957-&#160;Phelps, Daniel C.&#160;Gathegi, John Ng&rsquo;ang&rsquo;a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763793012<br/> Virtualization security : protecting virtualized environments ent://SD_ILS/0/SD_ILS:207090 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Shackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118288122<br/> Cyber war will not take place / Thomas Rid. ent://SD_ILS/0/SD_ILS:220343 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Rid, Thomas, 1975-, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781849042802<br/> Online privacy ent://SD_ILS/0/SD_ILS:222468 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Marzolf, Julie Schwab&#160;Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN&#160;9781433972249<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> Cell phone safety ent://SD_ILS/0/SD_ILS:217927 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Allen, Kathy.<br/>2013<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN&#160;9781429699457<br/> The black belt librarian : real-world safety &amp; security ent://SD_ILS/0/SD_ILS:201193 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Graham, Warren Davis<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838911372<br/> Web application security : a beginner's guide ent://SD_ILS/0/SD_ILS:179306 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Sullivan, Bryan, 1974-&#160;Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Jabatan<br/>ISBN&#160;9780071776165<br/> Securing the clicks : network security in the age of social media ent://SD_ILS/0/SD_ILS:184801 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Bahadur, Gary&#160;Inasi, Jason&#160;De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071769051<br/> Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Hacking exposed 7: network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:224141 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z McClure, Stuart&#160;Scambray, Joel.&#160;Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071780285<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:141357 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Davis, Chris (Christopher Michael)&#160;Schiller, Mike&#160;Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071742382<br/> Airport planning and management ent://SD_ILS/0/SD_ILS:146481 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Young, Seth B.&#160;Wells, Alexander<br/>&quot;The definitive, up-to-date guide to airport planning and management. Fully revised, updated, and reorganized to reflect the latest advances in the aviation industry, Airport Planning and Management, Sixth Edition offers comprehensive coverage of this challenging field. Airports, airport systems, operations management, and administration are discussed in detail. This authoritative volume addresses changes in technology, structure, and political environment, including enhanced security, environmental impact, and regulatory issues. The Sixth Edition of this landmark guide to the planning, development, and management of airports is ideal as a course text, self-study tool, and professional reference.Coverage includes: Introduction to airports and airport systems Airport and airport systems: organization and administration Historical and legislative perspectives The airfield Airspace and air traffic management Airport operations management under FAR Part 139 Airport terminals and ground access Airport security Airport financial management Economic, political, and social role of airports Airport planning Airport capacity and delay The future of airport management&quot;--Provided by publisher.&#160;&quot;Airport Planning and Management, Sixth Edition offers detailed coverage of all of the advancements the aviation industry has experienced in the nearly seven years since the previous edition was published. These include the latest cutting-edge technologies; crucial changes to a variety of rules, regulations, and policies; essential security measures; and reactions to geopolitical events. This is the most authoritative, up-to-date, and comprehensive resource on the topic&quot;--Provided by publisher.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071750240<br/> Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedings ent://SD_ILS/0/SD_ILS:191560 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z RFIDsec '11 Asia (2011 : Wuxi Shi, China)&#160;Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607507215<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:191573 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597496513<br/> Security strategies in web applications and social networking ent://SD_ILS/0/SD_ILS:161794 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791957<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:175354 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Campagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470927533<br/> E-mail marketing for dummies ent://SD_ILS/0/SD_ILS:175443 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Arnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470947678<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Is your child safe online? : a parent's guide to the internet, Facebook, mobile phones &amp; other new media ent://SD_ILS/0/SD_ILS:212950 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Whitby, Pamela<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781905410941<br/> Mobile application security ent://SD_ILS/0/SD_ILS:186415 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Dwivedi, Himanshu&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071633567<br/> Cloud security : a comprehensive guide to secure cloud computing ent://SD_ILS/0/SD_ILS:172467 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L., 1938-&#160;Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470589878<br/> IT security metrics : a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:172541 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071713405<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:118962 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Lacey, David<br/>2009<br/>ISBN&#160;9780470721995<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:123220 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Howard, Micheal, 1965-&#160;LeBlanc, David&#160;Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071626750<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:134361 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z 2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781439806920<br/> Business predators : how not to get ripped off in small business ent://SD_ILS/0/SD_ILS:135311 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Carr, Carla.<br/>2009<br/>ISBN&#160;9781897178812<br/> Business predators : how not to get ripped off in small business ent://SD_ILS/0/SD_ILS:135819 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Carr, Carla.<br/>2009<br/>ISBN&#160;9781897178812<br/> Business predators : how not to get ripped off in small business ent://SD_ILS/0/SD_ILS:136154 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Carr, Carla.<br/>2009<br/>ISBN&#160;9781897178812<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:172570 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321510105<br/> Applied security visualization ent://SD_ILS/0/SD_ILS:176452 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Marty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/> Network security fundamentals ent://SD_ILS/0/SD_ILS:95617 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Cole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Lembah Pantai<br/>ISBN&#160;9780470101926<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:96237 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97136 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97896 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:97854 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780470135921<br/> The CEH prep guide ent://SD_ILS/0/SD_ILS:98698 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Krutz, Ronald L.&#160;Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470135921<br/> Library Security And Safety Guide To Prevention, Planning And Response ent://SD_ILS/0/SD_ILS:99922 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Kahn, Miriam B.<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838909492<br/> The new school information security ent://SD_ILS/0/SD_ILS:99992 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Shostack, Adam<br/>2008<br/>ISBN&#160;9780321502780<br/> Digital audio watermarking techniques and technologies :bapplications and benchmarks ent://SD_ILS/0/SD_ILS:105402 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599045139<br/> Schneier on security ent://SD_ILS/0/SD_ILS:115440 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Schneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470395356<br/> Implementing email security and tokens : current standards, tools, and practices ent://SD_ILS/0/SD_ILS:115462 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Turner, Sean&#160;Housley, Russ<br/>2008<br/>ISBN&#160;9780470254639<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:116043 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470238387<br/> Is it safe : protecting your computer, you business, and yourself online ent://SD_ILS/0/SD_ILS:118900 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Miller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780789737823<br/> IT Governance : a manager's guide to data security and ISO 27001/ISO 27002 ent://SD_ILS/0/SD_ILS:106222 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Calder, Alan&#160;Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780749452711<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:111885 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780735625167<br/> Window Server 2008 ent://SD_ILS/0/SD_ILS:112817 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z 2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> Window Server 2008 PKI and certificate security ent://SD_ILS/0/SD_ILS:129636 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780735625167<br/> The sentinel CEO : perspectives on security, risk, and leadership in a post-9/11 world ent://SD_ILS/0/SD_ILS:91162 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Parrett, William G<br/>2007<br/>Perpustakaan Internet Bergerak<br/>ISBN&#160;9780470125410<br/> Trust in e-services : technologies, practices and challenges ent://SD_ILS/0/SD_ILS:93568 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Ronggong, Song&#160;Korba, Larry&#160;Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599042077<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93772 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599040905<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:93797 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Herrmann, Francine&#160;Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599040905<br/> Network security fundamentals project manual ent://SD_ILS/0/SD_ILS:95618 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Reese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN&#160;9780470127988<br/> Advances in enteprise information technology security ent://SD_ILS/0/SD_ILS:98717 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Khadraoui, Djamel&#160;Herrmann, Francine<br/>2007<br/>ISBN&#160;9781599040905<br/> IT Risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:103722 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:83111 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Layton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780849370878<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> IT risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:110090 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Piracy, maritime terrorism and securing the Malacca straits ent://SD_ILS/0/SD_ILS:90409 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Ong, Graham Gerard<br/>2006<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789812304179<br/> Tourism security and safety : from theory to practice ent://SD_ILS/0/SD_ILS:84728 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Pizam , Abraham<br/>2006<br/>ISBN&#160;9780750678988<br/> Digital rights management ent://SD_ILS/0/SD_ILS:84808 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Tassel, Joan Van.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780240807225<br/> A brief history of cryptology ent://SD_ILS/0/SD_ILS:75268 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Boone, J.V.<br/>2005<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591140849<br/> Hardening network security ent://SD_ILS/0/SD_ILS:78754 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Mallery, John<br/>2005<br/>ISBN&#160;9780072257038<br/> Risk, crisis and security management ent://SD_ILS/0/SD_ILS:84441 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Borodzicz, Edward P.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN&#160;9780470867044<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Defending the digital frontier : practical security for management ent://SD_ILS/0/SD_ILS:123604 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Babiak, Jan&#160;Butters, John<br/>2005<br/>ISBN&#160;9780471680871<br/> Hacker V Pakar keselamatan rangkaian ent://SD_ILS/0/SD_ILS:131730 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Man Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak&#160;Perpustakaan Kuala Lumpur, Cawangan Gombak Setia&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9789861250694<br/> Protecting your library's digital source : The essential guide to planning and preservation ent://SD_ILS/0/SD_ILS:120011 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Kahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780838908730<br/> Secrets and lies ent://SD_ILS/0/SD_ILS:123923 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Schneier, Bruce<br/>2004<br/>ISBN&#160;9780471453802<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:251286 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780072230208<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:253344 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Shema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780072230208<br/> Digital defense : what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:134350 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Parenty, Thomas J.<br/>2003<br/>ISBN&#160;9781578517794<br/> Applied cryptography : protocols, algorithms, and source code in C ent://SD_ILS/0/SD_ILS:198950 2025-11-04T06:39:30Z 2025-11-04T06:39:30Z Schneier, Bruce<br/>1996<br/>ISBN&#160;9780471117094<br/>