Search Results for Security system - Narrowed by: English SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystem$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300? 2025-12-29T05:21:30Z Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedings ent://SD_ILS/0/SD_ILS:191560 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z RFIDsec '11 Asia (2011 : Wuxi Shi, China)&#160;Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607507215<br/> Exploring Best Practice For Home Warranty System ent://SD_ILS/0/SD_ILS:271812 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Abdul Aziz Hussin&#160;Nor' Aini Yusof&#160;Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Lembah Pantai&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789674613327<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Wireless and mobile device security ent://SD_ILS/0/SD_ILS:240522 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Doherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284059274<br/> Virtualization security : protecting virtualized environments ent://SD_ILS/0/SD_ILS:207090 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Shackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118288122<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> American politics and society ent://SD_ILS/0/SD_ILS:215432 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z McKay, David<br/>2013<br/>ISBN&#160;9780470672631<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:191583 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco)&#160;Essaaidi, Mohamed&#160;Ganzha, M. (Maria)&#160;Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607508175<br/> 101 spy gadgets for the evil genius ent://SD_ILS/0/SD_ILS:192370 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Graham, Brad&#160;McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071772686<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Electronic Access Control ent://SD_ILS/0/SD_ILS:185919 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Norman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123820280<br/> Food systems failure : the global food crisis and the future of agriculture ent://SD_ILS/0/SD_ILS:220701 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Campbell, Hugh, 1964-&#160;Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780415712606<br/> iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices ent://SD_ILS/0/SD_ILS:191575 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Hoog, Andrew&#160;Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781597496599<br/> Security strategies in web applications and social networking ent://SD_ILS/0/SD_ILS:161794 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Hardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791957<br/> Food and agriculture security : an historical, multidisciplinary approach ent://SD_ILS/0/SD_ILS:166821 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Kastner, Justin<br/>A comprehensive understanding of food and agriculture security is best wrought through multidisciplinary analysis. Indeed, multiple academic disciplines provide lenses through which the multiple dimensions of food and agriculture security may be comprehensively examined. Food and agriculture security-- a stated priority research area of the U.S. Department of Homeland Security-- concerns the safety, security, and ongoing operation of the agricultural and food system in a global society that values both trade and security. Any attempt to understand the food system must involve multidisciplinary, multidimensional study. This book offers a bona fide multidisciplinary as well as historical approach to help students appreciate such a complex and multifaceted subject. Authored by scholars within the Frontier program for the historical studies of border security, food security, and trade policy, the book reviews some of the most salient and trade-related food and agriculture security concerns of the 19th century, describes the modern-day policy and industry contexts in which food and agriculture security issues arise, provides historical and contemporary illustrations of the vulnerability in the food and agriculture sector, identifies modern-day domestic (United States) as well as international (e.g., China) challenges, and highlights the role that public-private partnerships and cross-border cooperation must play in ensuring food and agriculture security in a globalized world.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780313383229<br/> What's the economy for, anyway? : why it's time to stop chasing growth and start pursuing happiness ent://SD_ILS/0/SD_ILS:180789 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z De Graaf, John.&#160;Batker, David<br/>&quot;What's The Economy For, Anyway? is a thought-provoking, funny, readable, anti-ideological book based on the cult hit film of the same name. Here, scholars John de Graaf (author of Affluenza) and David Batker tackle thirteen touchstone economic issues and challenge readers to consider just what the point of our economy is. Emphasizing powerful American ideals such as working together, pragmatism, and equality for all, de Graaf and Batker set forth a simple, powerful goal for any economic system: the greatest good for the greatest number, over the longest run. Their vision will appeal to a wide array of readers across traditional silos. Drawing from this nation's rich economic history, the book shows that the good life in America is achieved when people and markets work together with an active government to create a better economy, one that works for everyone, not just the privileged few. Beginning by taking our fetish for GDP and shattering it, the chapters touch on quality of life, health, security, time management, worklife, leisure, social justice, and perhaps most important, sustainability. This sparkling, message-driven book is exactly what we need: a guide to what really matters, and how we can use the resources of our economy to make the world a better place&quot;--<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781608195107<br/> E-mail marketing for dummies ent://SD_ILS/0/SD_ILS:175443 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Arnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470947678<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:147581 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Jang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791896<br/> Mobile application security ent://SD_ILS/0/SD_ILS:186415 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Dwivedi, Himanshu&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071633567<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:118962 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Lacey, David<br/>2009<br/>ISBN&#160;9780470721995<br/> Constitutional &amp; administrative law ent://SD_ILS/0/SD_ILS:222573 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Barnett, Hilaire<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780415473125<br/> Safety, security, health and enviroment law ent://SD_ILS/0/SD_ILS:100874 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Tooma, Michael<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781862876682<br/> Digital audio watermarking techniques and technologies :bapplications and benchmarks ent://SD_ILS/0/SD_ILS:105402 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599045139<br/> Implementing email security and tokens : current standards, tools, and practices ent://SD_ILS/0/SD_ILS:115462 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Turner, Sean&#160;Housley, Russ<br/>2008<br/>ISBN&#160;9780470254639<br/> Security and loss prevention : An introduction ent://SD_ILS/0/SD_ILS:123925 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Purpura, Philip P.<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123725257<br/> Trust in e-services : technologies, practices and challenges ent://SD_ILS/0/SD_ILS:93568 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Ronggong, Song&#160;Korba, Larry&#160;Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599042077<br/> IT Risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:103722 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> IT risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:110090 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Managing development : globalization, economic restructuring and social policy ent://SD_ILS/0/SD_ILS:83044 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Nakagawa, Junji, 1955-, ed.<br/>2006<br/>ISBN&#160;9780415364102<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:105563 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:84103 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:70982 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z Fugini, Mariagrazia, 1957-&#160;Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591401865<br/> Security operations for Microsoft Windows' 2000 server ent://SD_ILS/0/SD_ILS:91468 2025-12-29T05:21:30Z 2025-12-29T05:21:30Z 2002<br/>Perpustakaan Kuala Lumpur<br/>