Search Results for Security system - Narrowed by: EnglishSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystem$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300?2025-12-29T05:21:30ZFundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-12-29T05:21:30Z2025-12-29T05:21:30ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedingsent://SD_ILS/0/SD_ILS:1915602025-12-29T05:21:30Z2025-12-29T05:21:30ZRFIDsec '11 Asia (2011 : Wuxi Shi, China) Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607507215<br/>Exploring Best Practice For Home Warranty Systement://SD_ILS/0/SD_ILS:2718122025-12-29T05:21:30Z2025-12-29T05:21:30ZAbdul Aziz Hussin Nor' Aini Yusof Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Lembah Pantai Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674613327<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-12-29T05:21:30Z2025-12-29T05:21:30ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Wireless and mobile device securityent://SD_ILS/0/SD_ILS:2405222025-12-29T05:21:30Z2025-12-29T05:21:30ZDoherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284059274<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-12-29T05:21:30Z2025-12-29T05:21:30ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-12-29T05:21:30Z2025-12-29T05:21:30ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>American politics and societyent://SD_ILS/0/SD_ILS:2154322025-12-29T05:21:30Z2025-12-29T05:21:30ZMcKay, David<br/>2013<br/>ISBN 9780470672631<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-12-29T05:21:30Z2025-12-29T05:21:30ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>101 spy gadgets for the evil geniusent://SD_ILS/0/SD_ILS:1923702025-12-29T05:21:30Z2025-12-29T05:21:30ZGraham, Brad McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071772686<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-12-29T05:21:30Z2025-12-29T05:21:30ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>Electronic Access Controlent://SD_ILS/0/SD_ILS:1859192025-12-29T05:21:30Z2025-12-29T05:21:30ZNorman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780123820280<br/>Food systems failure : the global food crisis and the future of agricultureent://SD_ILS/0/SD_ILS:2207012025-12-29T05:21:30Z2025-12-29T05:21:30ZCampbell, Hugh, 1964- Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415712606<br/>iPhone and iOS forensics : investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devicesent://SD_ILS/0/SD_ILS:1915752025-12-29T05:21:30Z2025-12-29T05:21:30ZHoog, Andrew Strzempka, Katie<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496599<br/>Security strategies in web applications and social networkingent://SD_ILS/0/SD_ILS:1617942025-12-29T05:21:30Z2025-12-29T05:21:30ZHardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791957<br/>Food and agriculture security : an historical, multidisciplinary approachent://SD_ILS/0/SD_ILS:1668212025-12-29T05:21:30Z2025-12-29T05:21:30ZKastner, Justin<br/>A comprehensive understanding of food and agriculture security is best wrought through multidisciplinary analysis. Indeed, multiple academic disciplines provide lenses through which the multiple dimensions of food and agriculture security may be comprehensively examined. Food and agriculture security-- a stated priority research area of the U.S. Department of Homeland Security-- concerns the safety, security, and ongoing operation of the agricultural and food system in a global society that values both trade and security. Any attempt to understand the food system must involve multidisciplinary, multidimensional study. This book offers a bona fide multidisciplinary as well as historical approach to help students appreciate such a complex and multifaceted subject. Authored by scholars within the Frontier program for the historical studies of border security, food security, and trade policy, the book reviews some of the most salient and trade-related food and agriculture security concerns of the 19th century, describes the modern-day policy and industry contexts in which food and agriculture security issues arise, provides historical and contemporary illustrations of the vulnerability in the food and agriculture sector, identifies modern-day domestic (United States) as well as international (e.g., China) challenges, and highlights the role that public-private partnerships and cross-border cooperation must play in ensuring food and agriculture security in a globalized world.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780313383229<br/>What's the economy for, anyway? : why it's time to stop chasing growth and start pursuing happinessent://SD_ILS/0/SD_ILS:1807892025-12-29T05:21:30Z2025-12-29T05:21:30ZDe Graaf, John. Batker, David<br/>"What's The Economy For, Anyway? is a thought-provoking, funny, readable, anti-ideological book based on the cult hit film of the same name. Here, scholars John de Graaf (author of Affluenza) and David Batker tackle thirteen touchstone economic issues and challenge readers to consider just what the point of our economy is. Emphasizing powerful American ideals such as working together, pragmatism, and equality for all, de Graaf and Batker set forth a simple, powerful goal for any economic system: the greatest good for the greatest number, over the longest run. Their vision will appeal to a wide array of readers across traditional silos. Drawing from this nation's rich economic history, the book shows that the good life in America is achieved when people and markets work together with an active government to create a better economy, one that works for everyone, not just the privileged few. Beginning by taking our fetish for GDP and shattering it, the chapters touch on quality of life, health, security, time management, worklife, leisure, social justice, and perhaps most important, sustainability. This sparkling, message-driven book is exactly what we need: a guide to what really matters, and how we can use the resources of our economy to make the world a better place"--<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781608195107<br/>E-mail marketing for dummiesent://SD_ILS/0/SD_ILS:1754432025-12-29T05:21:30Z2025-12-29T05:21:30ZArnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470947678<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-12-29T05:21:30Z2025-12-29T05:21:30ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-12-29T05:21:30Z2025-12-29T05:21:30ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Mobile application securityent://SD_ILS/0/SD_ILS:1864152025-12-29T05:21:30Z2025-12-29T05:21:30ZDwivedi, Himanshu Clark, Chris, 1980- Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071633567<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:1189622025-12-29T05:21:30Z2025-12-29T05:21:30ZLacey, David<br/>2009<br/>ISBN 9780470721995<br/>Constitutional & administrative lawent://SD_ILS/0/SD_ILS:2225732025-12-29T05:21:30Z2025-12-29T05:21:30ZBarnett, Hilaire<br/>2009<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415473125<br/>Safety, security, health and enviroment lawent://SD_ILS/0/SD_ILS:1008742025-12-29T05:21:30Z2025-12-29T05:21:30ZTooma, Michael<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781862876682<br/>Digital audio watermarking techniques and technologies :bapplications and benchmarksent://SD_ILS/0/SD_ILS:1054022025-12-29T05:21:30Z2025-12-29T05:21:30Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599045139<br/>Implementing email security and tokens : current standards, tools, and practicesent://SD_ILS/0/SD_ILS:1154622025-12-29T05:21:30Z2025-12-29T05:21:30ZTurner, Sean Housley, Russ<br/>2008<br/>ISBN 9780470254639<br/>Security and loss prevention : An introductionent://SD_ILS/0/SD_ILS:1239252025-12-29T05:21:30Z2025-12-29T05:21:30ZPurpura, Philip P.<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780123725257<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-12-29T05:21:30Z2025-12-29T05:21:30ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>IT Risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1037222025-12-29T05:21:30Z2025-12-29T05:21:30ZWesterman, George Hunter, Richard<br/>2007<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-12-29T05:21:30Z2025-12-29T05:21:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-12-29T05:21:30Z2025-12-29T05:21:30ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-12-29T05:21:30Z2025-12-29T05:21:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>IT risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1100902025-12-29T05:21:30Z2025-12-29T05:21:30ZWesterman, George Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-12-29T05:21:30Z2025-12-29T05:21:30ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Managing development : globalization, economic restructuring and social policyent://SD_ILS/0/SD_ILS:830442025-12-29T05:21:30Z2025-12-29T05:21:30ZNakagawa, Junji, 1955-, ed.<br/>2006<br/>ISBN 9780415364102<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-12-29T05:21:30Z2025-12-29T05:21:30ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-12-29T05:21:30Z2025-12-29T05:21:30ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-12-29T05:21:30Z2025-12-29T05:21:30ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-12-29T05:21:30Z2025-12-29T05:21:30ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Security operations for Microsoft Windows' 2000 serverent://SD_ILS/0/SD_ILS:914682025-12-29T05:21:30Z2025-12-29T05:21:30Z2002<br/>Perpustakaan Kuala Lumpur<br/>