Search Results for Security systems - Narrowed by: BooksSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystems$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026ic$003dtrue$0026ps$003d300?2025-11-07T08:22:42ZIntelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-11-07T08:22:42Z2025-11-07T08:22:42ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>Security and game theory : algorithms, deployed systems, lessons learnedent://SD_ILS/0/SD_ILS:1927722025-11-07T08:22:42Z2025-11-07T08:22:42ZTambe, Milind, 1965-<br/>"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781107096424<br/>Principles of information systems security : text and casesent://SD_ILS/0/SD_ILS:843962025-11-07T08:22:42Z2025-11-07T08:22:42ZDhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780471450566<br/>Information security policies and actions in modern integrated systemsent://SD_ILS/0/SD_ILS:709822025-11-07T08:22:42Z2025-11-07T08:22:42ZFugini, Mariagrazia, 1957- Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781591401865<br/>Vehicle security systems : build your own alarm and protection systemsent://SD_ILS/0/SD_ILS:1593902025-11-07T08:22:42Z2025-11-07T08:22:42ZBrown, A. L.<br/>1996<br/>ISBN 9780750626309<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:2324992025-11-07T08:22:42Z2025-11-07T08:22:42ZWeiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284090703<br/>Wireless and mobile device securityent://SD_ILS/0/SD_ILS:2405222025-11-07T08:22:42Z2025-11-07T08:22:42ZDoherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284059274<br/>Security strategies in web applications and social networkingent://SD_ILS/0/SD_ILS:1617942025-11-07T08:22:42Z2025-11-07T08:22:42ZHardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791957<br/>Auditing IT infrastructures for complianceent://SD_ILS/0/SD_ILS:1474662025-11-07T08:22:42Z2025-11-07T08:22:42ZWeiss, Martin M. Solomon, Michael G.<br/>2011<br/>ISBN 9780763791810<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:1475812025-11-07T08:22:42Z2025-11-07T08:22:42ZJang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763791896<br/>Exploring Best Practice For Home Warranty Systement://SD_ILS/0/SD_ILS:2718122025-11-07T08:22:42Z2025-11-07T08:22:42ZAbdul Aziz Hussin Nor' Aini Yusof Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Lembah Pantai Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674613327<br/>Strategi WiFi Anti-Hackingent://SD_ILS/0/SD_ILS:2884912025-11-07T08:22:42Z2025-11-07T08:22:42ZAdi, Arista Prasetyo, author. Sanjaya, Ridwan, author. Wan Ahmad, translator. Hassan Noor, Dr., editor. Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443214<br/>Teknik Wireless Hacking dan Cara Pembendungannyaent://SD_ILS/0/SD_ILS:2912102025-11-07T08:22:42Z2025-11-07T08:22:42ZEfzy Zam, author. Nik Fauzi, translator. Nor Hanis Hashim, editor. Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN 9789674443221<br/>Virtualization security : protecting virtualized environmentsent://SD_ILS/0/SD_ILS:2070902025-11-07T08:22:42Z2025-11-07T08:22:42ZShackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781118288122<br/>Software agents, agent systems and their applicationsent://SD_ILS/0/SD_ILS:1915832025-11-07T08:22:42Z2025-11-07T08:22:42ZNATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco) Essaaidi, Mohamed Ganzha, M. (Maria) Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607508175<br/>101 spy gadgets for the evil geniusent://SD_ILS/0/SD_ILS:1923702025-11-07T08:22:42Z2025-11-07T08:22:42ZGraham, Brad McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9780071772686<br/>Electronic Access Controlent://SD_ILS/0/SD_ILS:1859192025-11-07T08:22:42Z2025-11-07T08:22:42ZNorman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780123820280<br/>Fundamentals of information system securityent://SD_ILS/0/SD_ILS:1474002025-11-07T08:22:42Z2025-11-07T08:22:42ZKim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780763790257<br/>Food systems failure : the global food crisis and the future of agricultureent://SD_ILS/0/SD_ILS:2207012025-11-07T08:22:42Z2025-11-07T08:22:42ZCampbell, Hugh, 1964- Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415712606<br/>Airport planning and managementent://SD_ILS/0/SD_ILS:1464812025-11-07T08:22:42Z2025-11-07T08:22:42ZYoung, Seth B. Wells, Alexander<br/>"The definitive, up-to-date guide to airport planning and management. Fully revised, updated, and reorganized to reflect the latest advances in the aviation industry, Airport Planning and Management, Sixth Edition offers comprehensive coverage of this challenging field. Airports, airport systems, operations management, and administration are discussed in detail. This authoritative volume addresses changes in technology, structure, and political environment, including enhanced security, environmental impact, and regulatory issues. The Sixth Edition of this landmark guide to the planning, development, and management of airports is ideal as a course text, self-study tool, and professional reference.Coverage includes: Introduction to airports and airport systems Airport and airport systems: organization and administration Historical and legislative perspectives The airfield Airspace and air traffic management Airport operations management under FAR Part 139 Airport terminals and ground access Airport security Airport financial management Economic, political, and social role of airports Airport planning Airport capacity and delay The future of airport management"--Provided by publisher. "Airport Planning and Management, Sixth Edition offers detailed coverage of all of the advancements the aviation industry has experienced in the nearly seven years since the previous edition was published. These include the latest cutting-edge technologies; crucial changes to a variety of rules, regulations, and policies; essential security measures; and reactions to geopolitical events. This is the most authoritative, up-to-date, and comprehensive resource on the topic"--Provided by publisher.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071750240<br/>Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedingsent://SD_ILS/0/SD_ILS:1915602025-11-07T08:22:42Z2025-11-07T08:22:42ZRFIDsec '11 Asia (2011 : Wuxi Shi, China) Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781607507215<br/>Emerging Wireless Technologies and the Future Mobile Internetent://SD_ILS/0/SD_ILS:1927652025-11-07T08:22:42Z2025-11-07T08:22:42ZRaychaudhuri, Dipankar, 1955- Gerla, Mario, 1943-<br/>"This book provides a preview of emerging wireless technologies and their architectural impact on the future mobile Internet. The reader will find an overview of architectural considerations for the mobile Internet, along with more detailed technical discussion of new protocol concepts currently being considered at the research stage. The first chapter starts with a discussion of anticipated mobile/wireless usage scenarios, leading to an identification of new protocol features for the future Internet. This is followed by several chapters that provide in-depth coverage of next-generation wireless standards, ad hoc and mesh network protocols, opportunistic delivery and delay tolerant networks, sensor network architectures and protocols, cognitive radio networks, vehicular networks, security and privacy, and experimental systems for future Internet research. Each of these contributed chapters includes a discussion of new networking requirements for the wireless scenario under consideration, architectural concepts and specific protocol designs, many still at research stage"--<br/>2011<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-b.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-b.html</a> Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-d.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-d.html</a> Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-t.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-t.html</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780521116466<br/>CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Ploneent://SD_ILS/0/SD_ILS:1725402025-11-07T08:22:42Z2025-11-07T08:22:42ZCanavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470916216<br/>E-mail marketing for dummiesent://SD_ILS/0/SD_ILS:1754432025-11-07T08:22:42Z2025-11-07T08:22:42ZArnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780470947678<br/>Mobile application securityent://SD_ILS/0/SD_ILS:1864152025-11-07T08:22:42Z2025-11-07T08:22:42ZDwivedi, Himanshu Clark, Chris, 1980- Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780071633567<br/>Managing the human factor in information security how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:1189622025-11-07T08:22:42Z2025-11-07T08:22:42ZLacey, David<br/>2009<br/>ISBN 9780470721995<br/>Safety, security, health and enviroment lawent://SD_ILS/0/SD_ILS:1008742025-11-07T08:22:42Z2025-11-07T08:22:42ZTooma, Michael<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781862876682<br/>Digital audio watermarking techniques and technologies :bapplications and benchmarksent://SD_ILS/0/SD_ILS:1054022025-11-07T08:22:42Z2025-11-07T08:22:42Z2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781599045139<br/>Implementing email security and tokens : current standards, tools, and practicesent://SD_ILS/0/SD_ILS:1154622025-11-07T08:22:42Z2025-11-07T08:22:42ZTurner, Sean Housley, Russ<br/>2008<br/>ISBN 9780470254639<br/>Security and loss prevention : An introductionent://SD_ILS/0/SD_ILS:1239252025-11-07T08:22:42Z2025-11-07T08:22:42ZPurpura, Philip P.<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780123725257<br/>Trust in e-services : technologies, practices and challengesent://SD_ILS/0/SD_ILS:935682025-11-07T08:22:42Z2025-11-07T08:22:42ZRonggong, Song Korba, Larry Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Jabatan Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781599042077<br/>IT Risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1037222025-11-07T08:22:42Z2025-11-07T08:22:42ZWesterman, George Hunter, Richard<br/>2007<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1055502025-11-07T08:22:42Z2025-11-07T08:22:42ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur<br/>ISBN 9781845426613<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1076252025-11-07T08:22:42Z2025-11-07T08:22:42ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>IT risk : Turning business threats into competitive advantageent://SD_ILS/0/SD_ILS:1100902025-11-07T08:22:42Z2025-11-07T08:22:42ZWesterman, George Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9781422106662<br/>Risk, complexity, and ICTent://SD_ILS/0/SD_ILS:1104662025-11-07T08:22:42Z2025-11-07T08:22:42ZHanseth, Ole Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781845426613<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-11-07T08:22:42Z2025-11-07T08:22:42ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Slamming spam : a guide for system administratorsent://SD_ILS/0/SD_ILS:443052025-11-07T08:22:42Z2025-11-07T08:22:42ZHaskins, Robert Nielsen, Dale<br/>2005<br/>ISBN 9780131467163<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-11-07T08:22:42Z2025-11-07T08:22:42ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Blocking spam and spyware for dummiesent://SD_ILS/0/SD_ILS:845982025-11-07T08:22:42Z2025-11-07T08:22:42ZGregory, Peter Simon, Michael A.<br/>2005<br/>ISBN 9780764575914<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:440842025-11-07T08:22:42Z2025-11-07T08:22:42ZPalmer, Brandon<br/>2004<br/>ISBN 9780321193667<br/>Wi-Fooent://SD_ILS/0/SD_ILS:442802025-11-07T08:22:42Z2025-11-07T08:22:42ZVladimirov, Andrew A. Gavrilenko, Konstantin V. Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321202178<br/>Securing E-business system : a guide for managers and executivesent://SD_ILS/0/SD_ILS:76792025-11-07T08:22:42Z2025-11-07T08:22:42ZBraithwaite, Timothy<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780471072980<br/>Wireless security models, threats and solutionsent://SD_ILS/0/SD_ILS:86032025-11-07T08:22:42Z2025-11-07T08:22:42ZNichols, Randall K. Lekkas, Panos C.<br/>2002<br/>ISBN 9780071207072<br/>The complete book of elctronic securityent://SD_ILS/0/SD_ILS:304382025-11-07T08:22:42Z2025-11-07T08:22:42ZPhilips, Bill<br/>2002<br/>ISBN 9780071380188<br/>Security operations for Microsoft Windows' 2000 serverent://SD_ILS/0/SD_ILS:914682025-11-07T08:22:42Z2025-11-07T08:22:42Z2002<br/>Perpustakaan Kuala Lumpur<br/>E-mail virus: protection handbookent://SD_ILS/0/SD_ILS:45432025-11-07T08:22:42Z2025-11-07T08:22:42Z2000<br/>ISBN 9781928994237<br/>Public address systemsent://SD_ILS/0/SD_ILS:1578152025-11-07T08:22:42Z2025-11-07T08:22:42ZCapel, Vivian<br/>1995<br/>ISBN 9780240514239<br/>