Search Results for Security measures - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bmeasures$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?2025-11-05T04:06:10ZInformation securityent://SD_ILS/0/SD_ILS:2808472025-11-05T04:06:10Z2025-11-05T04:06:10ZNoor Suhana Sulaiman Alsaggoff, Syed Zulkarnain Syed Idrus, author. Amiza Amir, author Wan Aniul Alyani Wan Mohamed, author. Azham Ahmad, author.<br/>2021<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670922997<br/>The Integration Of Naqli And Aqli In Information Security And Assurance From The Islamic & Technological Perspectivesent://SD_ILS/0/SD_ILS:2610882025-11-05T04:06:10Z2025-11-05T04:06:10ZSakinah Ali Pitchay, Dr., editor.<br/>2019<br/>ISBN 9789674405939<br/>Physical Security And Protection Of Identityent://SD_ILS/0/SD_ILS:2727302025-11-05T04:06:10Z2025-11-05T04:06:10ZZaheera Zainal Abidin<br/>2018<br/>Perpustakaan Kuala Lumpur Perpustakaan Jabatan Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Lembah Pantai<br/>ISBN 9789672145011<br/>Kisah benar cyber 999 : kompilasi coretan hidup di alam siberent://SD_ILS/0/SD_ILS:2276472025-11-05T04:06:10Z2025-11-05T04:06:10Z2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Lembah Pantai Perpustakaan Medan Idaman<br/>ISBN 9789678606134<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912025-11-05T04:06:10Z2025-11-05T04:06:10ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102025-11-05T04:06:10Z2025-11-05T04:06:10ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Online privacyent://SD_ILS/0/SD_ILS:2224682025-11-05T04:06:10Z2025-11-05T04:06:10ZMarzolf, Julie Schwab Shea, Therese<br/>2013<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781433972249<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-11-05T04:06:10Z2025-11-05T04:06:10ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-11-05T04:06:10Z2025-11-05T04:06:10ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:1753542025-11-05T04:06:10Z2025-11-05T04:06:10ZCampagna, Rich R.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470927533<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:1232202025-11-05T04:06:10Z2025-11-05T04:06:10ZHoward, Micheal, 1965- LeBlanc, David Viega, John<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071626750<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:1343612025-11-05T04:06:10Z2025-11-05T04:06:10Z2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781439806920<br/>The new school information securityent://SD_ILS/0/SD_ILS:999922025-11-05T04:06:10Z2025-11-05T04:06:10ZShostack, Adam<br/>2008<br/>ISBN 9780321502780<br/>Is it safe : protecting your computer, you business, and yourself onlineent://SD_ILS/0/SD_ILS:1189002025-11-05T04:06:10Z2025-11-05T04:06:10ZMiller, Michael 1958-<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780789737823<br/>IT Governance : a manager's guide to data security and ISO 27001/ISO 27002ent://SD_ILS/0/SD_ILS:1062222025-11-05T04:06:10Z2025-11-05T04:06:10ZCalder, Alan Watkins, Steve<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780749452711<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937722025-11-05T04:06:10Z2025-11-05T04:06:10ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:937972025-11-05T04:06:10Z2025-11-05T04:06:10ZHerrmann, Francine Khadraoui, Djamel<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599040905<br/>Advances in enteprise information technology securityent://SD_ILS/0/SD_ILS:987172025-11-05T04:06:10Z2025-11-05T04:06:10ZKhadraoui, Djamel Herrmann, Francine<br/>2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:831112025-11-05T04:06:10Z2025-11-05T04:06:10ZLayton, Timothy P.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849370878<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-11-05T04:06:10Z2025-11-05T04:06:10ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Managing cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-11-05T04:06:10Z2025-11-05T04:06:10ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>The ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:709612025-11-05T04:06:10Z2025-11-05T04:06:10ZGentile, Michael<br/>2006<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780849319525<br/>Pakar keselamatan rangkaianent://SD_ILS/0/SD_ILS:521042025-11-05T04:06:10Z2025-11-05T04:06:10Z2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789861250694<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:551382025-11-05T04:06:10Z2025-11-05T04:06:10ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Privacy: what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:558972025-11-05T04:06:10Z2025-11-05T04:06:10Z2005<br/>ISBN 9780321224095<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:565432025-11-05T04:06:10Z2025-11-05T04:06:10ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:600892025-11-05T04:06:10Z2025-11-05T04:06:10ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:601372025-11-05T04:06:10Z2025-11-05T04:06:10ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781401862657<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:602332025-11-05T04:06:10Z2025-11-05T04:06:10ZMerkow, Mark S.<br/>2005<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781401862657<br/>A brief history of cryptologyent://SD_ILS/0/SD_ILS:752682025-11-05T04:06:10Z2025-11-05T04:06:10ZBoone, J.V.<br/>2005<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur<br/>ISBN 9781591140849<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:476822025-11-05T04:06:10Z2025-11-05T04:06:10ZCannon, J.C<br/>2005<br/>ISBN 9780321224095<br/>Mapping security : the corporate security sourcebook for today's global economyent://SD_ILS/0/SD_ILS:477012025-11-05T04:06:10Z2025-11-05T04:06:10ZPatterson, Tom<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321304520<br/>Privacy : what developers and IT professionals should knowent://SD_ILS/0/SD_ILS:705902025-11-05T04:06:10Z2025-11-05T04:06:10ZCannon, J.C<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321224095<br/>TechTV security alert : stories of real people protecting themselves from identity theft, scams and virusesent://SD_ILS/0/SD_ILS:445022025-11-05T04:06:10Z2025-11-05T04:06:10ZWorley, Becky<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780735713529<br/>Malware : fighting malicious codeent://SD_ILS/0/SD_ILS:477862025-11-05T04:06:10Z2025-11-05T04:06:10ZSkoudis, Ed<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780131014053<br/>Protecting your library's digital source : The essential guide to planning and preservationent://SD_ILS/0/SD_ILS:1200112025-11-05T04:06:10Z2025-11-05T04:06:10ZKahn, Miriam.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780838908730<br/>Secrets and liesent://SD_ILS/0/SD_ILS:1239232025-11-05T04:06:10Z2025-11-05T04:06:10ZSchneier, Bruce<br/>2004<br/>ISBN 9780471453802<br/>Digital defense : what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:1343502025-11-05T04:06:10Z2025-11-05T04:06:10ZParenty, Thomas J.<br/>2003<br/>ISBN 9781578517794<br/>Wireless security models, threats and solutionsent://SD_ILS/0/SD_ILS:86032025-11-05T04:06:10Z2025-11-05T04:06:10ZNichols, Randall K. Lekkas, Panos C.<br/>2002<br/>ISBN 9780071207072<br/>Computer forensicsent://SD_ILS/0/SD_ILS:137602025-11-05T04:06:10Z2025-11-05T04:06:10ZKruse II, Warren G. Heiser, Jay G.<br/>2002<br/>ISBN 9780201707199<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-11-05T04:06:10Z2025-11-05T04:06:10ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>B2B and beyondent://SD_ILS/0/SD_ILS:51552025-11-05T04:06:10Z2025-11-05T04:06:10ZDemaio, Harry B.<br/>2001<br/>ISBN 9780471054665<br/>The complete guide to security internetent://SD_ILS/0/SD_ILS:14302025-11-05T04:06:10Z2025-11-05T04:06:10ZMerkow, Mark S.<br/>2000<br/>Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9780814470701<br/>