Search Results for Security systems - Narrowed by: Books SirsiDynix Enterprise http://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dSecurity$002bsystems$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026ic$003dtrue$0026ps$003d300? 2025-11-07T08:22:42Z Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:212302 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Yang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780124047020<br/> Security and game theory : algorithms, deployed systems, lessons learned ent://SD_ILS/0/SD_ILS:192772 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Tambe, Milind, 1965-<br/>&quot;Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world&quot;--<br/>2012<br/>Cover image <a href="http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg">http://assets.cambridge.org/97811070/96424/cover/9781107096424.jpg</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781107096424<br/> Principles of information systems security : text and cases ent://SD_ILS/0/SD_ILS:84396 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Dhillon, Gupreet<br/>2007<br/>Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780471450566<br/> Information security policies and actions in modern integrated systems ent://SD_ILS/0/SD_ILS:70982 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Fugini, Mariagrazia, 1957-&#160;Bellettini, Carlo, 1967-<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781591401865<br/> Vehicle security systems : build your own alarm and protection systems ent://SD_ILS/0/SD_ILS:159390 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Brown, A. L.<br/>1996<br/>ISBN&#160;9780750626309<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:232499 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Weiss, Marty M.<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284090703<br/> Wireless and mobile device security ent://SD_ILS/0/SD_ILS:240522 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Doherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781284059274<br/> Security strategies in web applications and social networking ent://SD_ILS/0/SD_ILS:161794 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Hardwod, Mike<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791957<br/> Auditing IT infrastructures for compliance ent://SD_ILS/0/SD_ILS:147466 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Weiss, Martin M.&#160;Solomon, Michael G.<br/>2011<br/>ISBN&#160;9780763791810<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:147581 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Jang, Michael H.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763791896<br/> Exploring Best Practice For Home Warranty System ent://SD_ILS/0/SD_ILS:271812 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Abdul Aziz Hussin&#160;Nor' Aini Yusof&#160;Noriyanti Jahaya<br/>2019<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Medan Idaman&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Lembah Pantai&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9789674613327<br/> Strategi WiFi Anti-Hacking ent://SD_ILS/0/SD_ILS:288491 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Adi, Arista Prasetyo, author.&#160;Sanjaya, Ridwan, author.&#160;Wan Ahmad, translator.&#160;Hassan Noor, Dr., editor.&#160;Shah Amirul Azim, editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443214<br/> Teknik Wireless Hacking dan Cara Pembendungannya ent://SD_ILS/0/SD_ILS:291210 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Efzy Zam, author.&#160;Nik Fauzi, translator.&#160;Nor Hanis Hashim, editor.&#160;Hassan Noor, Dr., editor.<br/>2015<br/>Pustaka KL @ Keramat<br/>ISBN&#160;9789674443221<br/> Virtualization security : protecting virtualized environments ent://SD_ILS/0/SD_ILS:207090 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Shackleford, Dave, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781118288122<br/> Software agents, agent systems and their applications ent://SD_ILS/0/SD_ILS:191583 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z NATO Advanced Study Institute on Software Agents, Agent Systems and their Applications (2010 : Tangier, Morocco)&#160;Essaaidi, Mohamed&#160;Ganzha, M. (Maria)&#160;Paprzycki, Marcin<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607508175<br/> 101 spy gadgets for the evil genius ent://SD_ILS/0/SD_ILS:192370 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Graham, Brad&#160;McGowan, Kathy<br/>2012<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9780071772686<br/> Electronic Access Control ent://SD_ILS/0/SD_ILS:185919 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Norman, Thomas L.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123820280<br/> Fundamentals of information system security ent://SD_ILS/0/SD_ILS:147400 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Kim, David<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780763790257<br/> Food systems failure : the global food crisis and the future of agriculture ent://SD_ILS/0/SD_ILS:220701 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Campbell, Hugh, 1964-&#160;Stock, Paul V.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780415712606<br/> Airport planning and management ent://SD_ILS/0/SD_ILS:146481 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Young, Seth B.&#160;Wells, Alexander<br/>&quot;The definitive, up-to-date guide to airport planning and management. Fully revised, updated, and reorganized to reflect the latest advances in the aviation industry, Airport Planning and Management, Sixth Edition offers comprehensive coverage of this challenging field. Airports, airport systems, operations management, and administration are discussed in detail. This authoritative volume addresses changes in technology, structure, and political environment, including enhanced security, environmental impact, and regulatory issues. The Sixth Edition of this landmark guide to the planning, development, and management of airports is ideal as a course text, self-study tool, and professional reference.Coverage includes: Introduction to airports and airport systems Airport and airport systems: organization and administration Historical and legislative perspectives The airfield Airspace and air traffic management Airport operations management under FAR Part 139 Airport terminals and ground access Airport security Airport financial management Economic, political, and social role of airports Airport planning Airport capacity and delay The future of airport management&quot;--Provided by publisher.&#160;&quot;Airport Planning and Management, Sixth Edition offers detailed coverage of all of the advancements the aviation industry has experienced in the nearly seven years since the previous edition was published. These include the latest cutting-edge technologies; crucial changes to a variety of rules, regulations, and policies; essential security measures; and reactions to geopolitical events. This is the most authoritative, up-to-date, and comprehensive resource on the topic&quot;--Provided by publisher.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071750240<br/> Radio frequency identification system security : RFIDsec '11 Asia Workshop proceedings ent://SD_ILS/0/SD_ILS:191560 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z RFIDsec '11 Asia (2011 : Wuxi Shi, China)&#160;Li, Tieyan<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781607507215<br/> Emerging Wireless Technologies and the Future Mobile Internet ent://SD_ILS/0/SD_ILS:192765 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Raychaudhuri, Dipankar, 1955-&#160;Gerla, Mario, 1943-<br/>&quot;This book provides a preview of emerging wireless technologies and their architectural impact on the future mobile Internet. The reader will find an overview of architectural considerations for the mobile Internet, along with more detailed technical discussion of new protocol concepts currently being considered at the research stage. The first chapter starts with a discussion of anticipated mobile/wireless usage scenarios, leading to an identification of new protocol features for the future Internet. This is followed by several chapters that provide in-depth coverage of next-generation wireless standards, ad hoc and mesh network protocols, opportunistic delivery and delay tolerant networks, sensor network architectures and protocols, cognitive radio networks, vehicular networks, security and privacy, and experimental systems for future Internet research. Each of these contributed chapters includes a discussion of new networking requirements for the wireless scenario under consideration, architectural concepts and specific protocol designs, many still at research stage&quot;--<br/>2011<br/>Contributor biographical information <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-b.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-b.html</a>&#160;Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-d.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-d.html</a>&#160;Table of contents only <a href="http://www.loc.gov/catdir/enhancements/fy1102/2010049729-t.html">http://www.loc.gov/catdir/enhancements/fy1102/2010049729-t.html</a><br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780521116466<br/> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone ent://SD_ILS/0/SD_ILS:172540 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Canavan, Tom<br/>Provides information on maintaining security for websites built on open source Content Management Systems.<br/>2011<br/>Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9780470916216<br/> E-mail marketing for dummies ent://SD_ILS/0/SD_ILS:175443 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Arnold, John, 1972-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780470947678<br/> Mobile application security ent://SD_ILS/0/SD_ILS:186415 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Dwivedi, Himanshu&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780071633567<br/> Managing the human factor in information security how to win over staff and influence business managers ent://SD_ILS/0/SD_ILS:118962 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Lacey, David<br/>2009<br/>ISBN&#160;9780470721995<br/> Safety, security, health and enviroment law ent://SD_ILS/0/SD_ILS:100874 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Tooma, Michael<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781862876682<br/> Digital audio watermarking techniques and technologies :bapplications and benchmarks ent://SD_ILS/0/SD_ILS:105402 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z 2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781599045139<br/> Implementing email security and tokens : current standards, tools, and practices ent://SD_ILS/0/SD_ILS:115462 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Turner, Sean&#160;Housley, Russ<br/>2008<br/>ISBN&#160;9780470254639<br/> Security and loss prevention : An introduction ent://SD_ILS/0/SD_ILS:123925 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Purpura, Philip P.<br/>2008<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780123725257<br/> Trust in e-services : technologies, practices and challenges ent://SD_ILS/0/SD_ILS:93568 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Ronggong, Song&#160;Korba, Larry&#160;Yee, George<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Jabatan&#160;Perpustakaan Kuala Lumpur&#160;Perpustakaan Kuala Lumpur, Cawangan Setiawangsa&#160;Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781599042077<br/> IT Risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:103722 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:105550 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul&#160;Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781845426613<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:107625 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> IT risk : Turning business threats into competitive advantage ent://SD_ILS/0/SD_ILS:110090 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Westerman, George&#160;Hunter, Richard<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN&#160;9781422106662<br/> Risk, complexity, and ICT ent://SD_ILS/0/SD_ILS:110466 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Hanseth, Ole&#160;Ciborra, Claudia<br/>2007<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN&#160;9781845426613<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:105563 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Slamming spam : a guide for system administrators ent://SD_ILS/0/SD_ILS:44305 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Haskins, Robert&#160;Nielsen, Dale<br/>2005<br/>ISBN&#160;9780131467163<br/> Advanced guide to linux networking and security ent://SD_ILS/0/SD_ILS:84103 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Sawicki, Ed&#160;Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9781418835392<br/> Blocking spam and spyware for dummies ent://SD_ILS/0/SD_ILS:84598 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Gregory, Peter&#160;Simon, Michael A.<br/>2005<br/>ISBN&#160;9780764575914<br/> Secure architectures with OpenBSD ent://SD_ILS/0/SD_ILS:44084 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Palmer, Brandon<br/>2004<br/>ISBN&#160;9780321193667<br/> Wi-Foo ent://SD_ILS/0/SD_ILS:44280 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Vladimirov, Andrew A.&#160;Gavrilenko, Konstantin V.&#160;Mikhailovsky, Andrei A.<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780321202178<br/> Securing E-business system : a guide for managers and executives ent://SD_ILS/0/SD_ILS:7679 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Braithwaite, Timothy<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN&#160;9780471072980<br/> Wireless security models, threats and solutions ent://SD_ILS/0/SD_ILS:8603 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Nichols, Randall K.&#160;Lekkas, Panos C.<br/>2002<br/>ISBN&#160;9780071207072<br/> The complete book of elctronic security ent://SD_ILS/0/SD_ILS:30438 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Philips, Bill<br/>2002<br/>ISBN&#160;9780071380188<br/> Security operations for Microsoft Windows' 2000 server ent://SD_ILS/0/SD_ILS:91468 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z 2002<br/>Perpustakaan Kuala Lumpur<br/> E-mail virus: protection handbook ent://SD_ILS/0/SD_ILS:4543 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z 2000<br/>ISBN&#160;9781928994237<br/> Public address systems ent://SD_ILS/0/SD_ILS:157815 2025-11-07T08:22:42Z 2025-11-07T08:22:42Z Capel, Vivian<br/>1995<br/>ISBN&#160;9780240514239<br/>