Search Results for Security measures - Narrowed by: EnglishSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?2025-11-04T06:39:30ZInformation securityent://SD_ILS/0/SD_ILS:2808472025-11-04T06:39:30Z2025-11-04T06:39:30ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>Ccsp for dummiesent://SD_ILS/0/SD_ILS:2826212025-11-04T06:39:30Z2025-11-04T06:39:30ZArthur, J. Deane<br/>2021 2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119648376<br/>Comptia pentest certification for dummiesent://SD_ILS/0/SD_ILS:2826182025-11-04T06:39:30Z2025-11-04T06:39:30ZClarke, Glen E.<br/>2020<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781119633556<br/>A Garfield guide to posting online : pause before you postent://SD_ILS/0/SD_ILS:3030022025-11-04T06:39:30Z2025-11-04T06:39:30ZScott Nickel<br/>2020<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN 9781541572799<br/>The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-11-04T06:39:30Z2025-11-04T06:39:30ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Internet Content Regulation Contemporary Legal And Regulatory Issues In The Changing Digital Landscapeent://SD_ILS/0/SD_ILS:2610922025-11-04T06:39:30Z2025-11-04T06:39:30ZMahyuddin Daud<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Pustaka KL @ PPR Pinggiran Bukit Jalil Perpustakaan Lembah Pantai<br/>ISBN 9789674910198<br/>Management Of Information Securityent://SD_ILS/0/SD_ILS:2612542025-11-04T06:39:30Z2025-11-04T06:39:30ZWhitman, Michael E., Mattford, Herbert J., author.<br/>2019<br/>ISBN 9781337405713<br/>Cyber Risk Leadersent://SD_ILS/0/SD_ILS:2749462025-11-04T06:39:30Z2025-11-04T06:39:30ZShamane Tan<br/>2019<br/>Perpustakaan Kuala Lumpur Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN 9780648595311<br/>Exploring Best Practice For Home Warranty Systement://SD_ILS/0/SD_ILS:2718122025-11-04T06:39:30Z2025-11-04T06:39:30ZAbdul Aziz Hussin Nor' Aini Yusof Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Lembah Pantai Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674613327<br/>Network Security And Cryptography : A Self-Teaching Introductionent://SD_ILS/0/SD_ILS:2640212025-11-04T06:39:30Z2025-11-04T06:39:30ZMusa, Sarhan M.<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781942270836<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-11-04T06:39:30Z2025-11-04T06:39:30ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Principles Of Information Security : Sixth Editionent://SD_ILS/0/SD_ILS:2551452025-11-04T06:39:30Z2025-11-04T06:39:30ZWhitman, Michael E Mattord, Herbert J., author.<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781337102063<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792025-11-04T06:39:30Z2025-11-04T06:39:30ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>Google Cybersecurity Expert Parisa Tabrizent://SD_ILS/0/SD_ILS:2692072025-11-04T06:39:30Z2025-11-04T06:39:30ZDiPiazza, Domenica<br/>2018<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781541500075<br/>Staying safe onlineent://SD_ILS/0/SD_ILS:2707792025-11-04T06:39:30Z2025-11-04T06:39:30ZBrundle, Harriet<br/>2018<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN 9781489678942<br/>Understanding the digital world : what you need to know about computers, the internet, privacy, and securityent://SD_ILS/0/SD_ILS:2482662025-11-04T06:39:30Z2025-11-04T06:39:30ZKernighan, Brian W.<br/>2017<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780691176543<br/>The art of invisibility :/ the world's most famous hacker teaches you how to be safe in the age of Big Brother and big dataent://SD_ILS/0/SD_ILS:2534952025-11-04T06:39:30Z2025-11-04T06:39:30ZMitnick,Kevin D; Vamosi Robert Vamosi, Robert, author.<br/>2017<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780316380508<br/>Network And Data Security For Non-Engineersent://SD_ILS/0/SD_ILS:2564402025-11-04T06:39:30Z2025-11-04T06:39:30ZGroom,Frank; Groom,Kevin; Jones,Stephan author Groom,Kevin<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781498767866<br/>Security In The Private Cloudent://SD_ILS/0/SD_ILS:2564412025-11-04T06:39:30Z2025-11-04T06:39:30ZVacca,John R<br/>2017<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781482259551<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-11-04T06:39:30Z2025-11-04T06:39:30ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Wireless and mobile device securityent://SD_ILS/0/SD_ILS:2405222025-11-04T06:39:30Z2025-11-04T06:39:30ZDoherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284059274<br/>Elementary information securityent://SD_ILS/0/SD_ILS:2407022025-11-04T06:39:30Z2025-11-04T06:39:30ZSmith, Richard E., 1952-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284055931<br/>Saving lives and staying alive : humanitarian security in the age of risk managementent://SD_ILS/0/SD_ILS:2428652025-11-04T06:39:30Z2025-11-04T06:39:30ZNeuman, Michael Weissman, Fabrice, 1969- editor<br/>2016<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781849046510<br/>Claim Your Domain - And Own Your Online Presenceent://SD_ILS/0/SD_ILS:2546052025-11-04T06:39:30Z2025-11-04T06:39:30ZWatters, Audrey<br/>2016<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781942496236<br/>Mobile phone safetyent://SD_ILS/0/SD_ILS:2638702025-11-04T06:39:30Z2025-11-04T06:39:30ZKathy Allen<br/>2016<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781474724333<br/>Safe Social Networkingent://SD_ILS/0/SD_ILS:2638712025-11-04T06:39:30Z2025-11-04T06:39:30ZHeather E Schwartz<br/>2016<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781474724302<br/>Introduction To Certificateless Cryptographyent://SD_ILS/0/SD_ILS:2557092025-11-04T06:39:30Z2025-11-04T06:39:30ZXiong, Hu Qin, Zhen, 1982- author. Vasilakos, Athanasios, author.<br/>2016<br/>ISBN 9781482248609<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:2304002025-11-04T06:39:30Z2025-11-04T06:39:30ZSchneier, Bruce<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781119092438<br/>Library security : better communication, safer facilitiesent://SD_ILS/0/SD_ILS:2325062025-11-04T06:39:30Z2025-11-04T06:39:30ZAlbrecht, Steve<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780838913307<br/>Technology disaster response and recovery planning : a LITA guideent://SD_ILS/0/SD_ILS:2377902025-11-04T06:39:30Z2025-11-04T06:39:30ZMallery, Mary, editor<br/>2015<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780838913154<br/>Passwords and securityent://SD_ILS/0/SD_ILS:2321882025-11-04T06:39:30Z2025-11-04T06:39:30ZMinton, Eric<br/>2014<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781477729427<br/>Facebook safety and privacyent://SD_ILS/0/SD_ILS:2331692025-11-04T06:39:30Z2025-11-04T06:39:30ZBrown, Tracy<br/>2014<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781448895809<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-11-04T06:39:30Z2025-11-04T06:39:30ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Information security for managersent://SD_ILS/0/SD_ILS:2067052025-11-04T06:39:30Z2025-11-04T06:39:30ZWorkman, Michael D., 1957- Phelps, Daniel C. Gathegi, John Ng’ang’a<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763793012<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-11-04T06:39:30Z2025-11-04T06:39:30ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Cyber war will not take place / Thomas Rid.ent://SD_ILS/0/SD_ILS:2203432025-11-04T06:39:30Z2025-11-04T06:39:30ZRid, Thomas, 1975-, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781849042802<br/>Online privacyent://SD_ILS/0/SD_ILS:2224682025-11-04T06:39:30Z2025-11-04T06:39:30ZMarzolf, Julie Schwab Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972249<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-11-04T06:39:30Z2025-11-04T06:39:30ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>Cell phone safetyent://SD_ILS/0/SD_ILS:2179272025-11-04T06:39:30Z2025-11-04T06:39:30ZAllen, Kathy.<br/>2013<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN 9781429699457<br/>The black belt librarian : real-world safety & securityent://SD_ILS/0/SD_ILS:2011932025-11-04T06:39:30Z2025-11-04T06:39:30ZGraham, Warren Davis<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838911372<br/>Web application security : a beginner's guideent://SD_ILS/0/SD_ILS:1793062025-11-04T06:39:30Z2025-11-04T06:39:30ZSullivan, Bryan, 1974- Liu, Vincent<br/>2012<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan<br/>ISBN 9780071776165<br/>Securing the clicks : network security in the age of social mediaent://SD_ILS/0/SD_ILS:1848012025-11-04T06:39:30Z2025-11-04T06:39:30ZBahadur, Gary Inasi, Jason De Carvalho, Jason<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071769051<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-11-04T06:39:30Z2025-11-04T06:39:30ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed 7: network security secrets & solutionsent://SD_ILS/0/SD_ILS:2241412025-11-04T06:39:30Z2025-11-04T06:39:30ZMcClure, Stuart Scambray, Joel. Kurtz, George<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071780285<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:1413572025-11-04T06:39:30Z2025-11-04T06:39:30ZDavis, Chris (Christopher Michael) Schiller, Mike Wheeler, Kevin<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071742382<br/>Airport planning and managementent://SD_ILS/0/SD_ILS:1464812025-11-04T06:39:30Z2025-11-04T06:39:30ZYoung, Seth B. Wells, Alexander<br/>"The definitive, up-to-date guide to airport planning and management. Fully revised, updated, and reorganized to reflect the latest advances in the aviation industry, Airport Planning and Management, Sixth Edition offers comprehensive coverage of this challenging field. Airports, airport systems, operations management, and administration are discussed in detail. This authoritative volume addresses changes in technology, structure, and political environment, including enhanced security, environmental impact, and regulatory issues. The Sixth Edition of this landmark guide to the planning, development, and management of airports is ideal as a course text, self-study tool, and professional reference.Coverage includes: Introduction to airports and airport systems Airport and airport systems: organization and administration Historical and legislative perspectives The airfield Airspace and air traffic management Airport operations management under FAR Part 139 Airport terminals and ground access Airport security Airport financial management Economic, political, and social role of airports Airport planning Airport capacity and delay The future of airport management"--Provided by publisher. "Airport Planning and Management, Sixth Edition offers detailed coverage of all of the advancements the aviation industry has experienced in the nearly seven years since the previous edition was published. These include the latest cutting-edge technologies; crucial changes to a variety of rules, regulations, and policies; essential security measures; and reactions to geopolitical events. This is the most authoritative, up-to-date, and comprehensive resource on the topic"--Provided by publisher.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071750240<br/>Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedingsent://SD_ILS/0/SD_ILS:1915602025-11-04T06:39:30Z2025-11-04T06:39:30ZRFIDsec '11 Asia (2011 : Wuxi Shi, China) Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607507215<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1915732025-11-04T06:39:30Z2025-11-04T06:39:30ZHoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496513<br/>Security strategies in web applications and social networkingent://SD_ILS/0/SD_ILS:1617942025-11-04T06:39:30Z2025-11-04T06:39:30ZHardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791957<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1725402025-11-04T06:39:30Z2025-11-04T06:39:30ZCanavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470916216<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-11-04T06:39:30Z2025-11-04T06:39:30ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>E-mail marketing for dummiesent://SD_ILS/0/SD_ILS:1754432025-11-04T06:39:30Z2025-11-04T06:39:30ZArnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470947678<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-11-04T06:39:30Z2025-11-04T06:39:30ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Is your child safe online? : a parent's guide to the internet, Facebook, mobile phones & other new mediaent://SD_ILS/0/SD_ILS:2129502025-11-04T06:39:30Z2025-11-04T06:39:30ZWhitby, Pamela<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781905410941<br/>Mobile application securityent://SD_ILS/0/SD_ILS:1864152025-11-04T06:39:30Z2025-11-04T06:39:30ZDwivedi, Himanshu Clark, Chris, 1980- Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071633567<br/>Cloud security : a comprehensive guide to secure cloud computingent://SD_ILS/0/SD_ILS:1724672025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L., 1938- Vines, Russell Dean, 1952-<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470589878<br/>IT security metrics : a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:1725412025-11-04T06:39:30Z2025-11-04T06:39:30ZHayden, Lance<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071713405<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:1189622025-11-04T06:39:30Z2025-11-04T06:39:30ZLacey, David<br/>2009<br/>ISBN 9780470721995<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-11-04T06:39:30Z2025-11-04T06:39:30ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-11-04T06:39:30Z2025-11-04T06:39:30Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>Business predators : how not to get ripped off in small businessent://SD_ILS/0/SD_ILS:1353112025-11-04T06:39:30Z2025-11-04T06:39:30ZCarr, Carla.<br/>2009<br/>ISBN 9781897178812<br/>Business predators : how not to get ripped off in small businessent://SD_ILS/0/SD_ILS:1358192025-11-04T06:39:30Z2025-11-04T06:39:30ZCarr, Carla.<br/>2009<br/>ISBN 9781897178812<br/>Business predators : how not to get ripped off in small businessent://SD_ILS/0/SD_ILS:1361542025-11-04T06:39:30Z2025-11-04T06:39:30ZCarr, Carla.<br/>2009<br/>ISBN 9781897178812<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1725702025-11-04T06:39:30Z2025-11-04T06:39:30ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321510105<br/>Applied security visualizationent://SD_ILS/0/SD_ILS:1764522025-11-04T06:39:30Z2025-11-04T06:39:30ZMarty, Raffael, 1976-<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>Network security fundamentalsent://SD_ILS/0/SD_ILS:956172025-11-04T06:39:30Z2025-11-04T06:39:30ZCole, Eric<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Lembah Pantai<br/>ISBN 9780470101926<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:962372025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:971362025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978962025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:978542025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780470135921<br/>The CEH prep guideent://SD_ILS/0/SD_ILS:986982025-11-04T06:39:30Z2025-11-04T06:39:30ZKrutz, Ronald L. Vines, Russell Dean<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470135921<br/>Library Security And Safety Guide To Prevention, Planning And Responseent://SD_ILS/0/SD_ILS:999222025-11-04T06:39:30Z2025-11-04T06:39:30ZKahn, Miriam B.<br/>2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9780838909492<br/>The new school information securityent://SD_ILS/0/SD_ILS:999922025-11-04T06:39:30Z2025-11-04T06:39:30ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Digital audio watermarking techniques and technologies :bapplications and benchmarksent://SD_ILS/0/SD_ILS:1054022025-11-04T06:39:30Z2025-11-04T06:39:30Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599045139<br/>Schneier on securityent://SD_ILS/0/SD_ILS:1154402025-11-04T06:39:30Z2025-11-04T06:39:30ZSchneier, Bruce<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470395356<br/>Implementing email security and tokens : current standards, tools, and practicesent://SD_ILS/0/SD_ILS:1154622025-11-04T06:39:30Z2025-11-04T06:39:30ZTurner, Sean Housley, Russ<br/>2008<br/>ISBN 9780470254639<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:1160432025-11-04T06:39:30Z2025-11-04T06:39:30ZHoffman, Daniel V., 1972-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470238387<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-11-04T06:39:30Z2025-11-04T06:39:30ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-11-04T06:39:30Z2025-11-04T06:39:30ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1118852025-11-04T06:39:30Z2025-11-04T06:39:30Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780735625167<br/>Window Server 2008ent://SD_ILS/0/SD_ILS:1128172025-11-04T06:39:30Z2025-11-04T06:39:30Z2008<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>Window Server 2008 PKI and certificate securityent://SD_ILS/0/SD_ILS:1296362025-11-04T06:39:30Z2025-11-04T06:39:30Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735625167<br/>The sentinel CEO : perspectives on security, risk, and leadership in a post-9/11 worldent://SD_ILS/0/SD_ILS:911622025-11-04T06:39:30Z2025-11-04T06:39:30ZParrett, William G<br/>2007<br/>Perpustakaan Internet Bergerak<br/>ISBN 9780470125410<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-11-04T06:39:30Z2025-11-04T06:39:30ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-11-04T06:39:30Z2025-11-04T06:39:30ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-11-04T06:39:30Z2025-11-04T06:39:30ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Network security fundamentals project manualent://SD_ILS/0/SD_ILS:956182025-11-04T06:39:30Z2025-11-04T06:39:30ZReese, Rachelle<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780470127988<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-11-04T06:39:30Z2025-11-04T06:39:30ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>IT Risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1037222025-11-04T06:39:30Z2025-11-04T06:39:30ZWesterman, George Hunter, Richard<br/>2007<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-11-04T06:39:30Z2025-11-04T06:39:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-11-04T06:39:30Z2025-11-04T06:39:30ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-11-04T06:39:30Z2025-11-04T06:39:30ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-11-04T06:39:30Z2025-11-04T06:39:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>IT risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1100902025-11-04T06:39:30Z2025-11-04T06:39:30ZWesterman, George Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-11-04T06:39:30Z2025-11-04T06:39:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Piracy, maritime terrorism and securing the Malacca straitsent://SD_ILS/0/SD_ILS:904092025-11-04T06:39:30Z2025-11-04T06:39:30ZOng, Graham Gerard<br/>2006<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789812304179<br/>Tourism security and safety : from theory to practiceent://SD_ILS/0/SD_ILS:847282025-11-04T06:39:30Z2025-11-04T06:39:30ZPizam , Abraham<br/>2006<br/>ISBN 9780750678988<br/>Digital rights managementent://SD_ILS/0/SD_ILS:848082025-11-04T06:39:30Z2025-11-04T06:39:30ZTassel, Joan Van.<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780240807225<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-11-04T06:39:30Z2025-11-04T06:39:30ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Hardening network securityent://SD_ILS/0/SD_ILS:787542025-11-04T06:39:30Z2025-11-04T06:39:30ZMallery, John<br/>2005<br/>ISBN 9780072257038<br/>Risk, crisis and security managementent://SD_ILS/0/SD_ILS:844412025-11-04T06:39:30Z2025-11-04T06:39:30ZBorodzicz, Edward P.<br/>2005<br/>Perpustakaan Jabatan<br/>ISBN 9780470867044<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-11-04T06:39:30Z2025-11-04T06:39:30ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Defending the digital frontier : practical security for managementent://SD_ILS/0/SD_ILS:1236042025-11-04T06:39:30Z2025-11-04T06:39:30ZBabiak, Jan Butters, John<br/>2005<br/>ISBN 9780471680871<br/>Hacker V Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:1317302025-11-04T06:39:30Z2025-11-04T06:39:30ZMan Pc<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-11-04T06:39:30Z2025-11-04T06:39:30ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-11-04T06:39:30Z2025-11-04T06:39:30ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2512862025-11-04T06:39:30Z2025-11-04T06:39:30ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780072230208<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:2533442025-11-04T06:39:30Z2025-11-04T06:39:30ZShema, Mike<br/>2004<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9780072230208<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-11-04T06:39:30Z2025-11-04T06:39:30ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Applied cryptography : protocols, algorithms, and source code in Cent://SD_ILS/0/SD_ILS:1989502025-11-04T06:39:30Z2025-11-04T06:39:30ZSchneier, Bruce<br/>1996<br/>ISBN 9780471117094<br/>