Search Results for analysis - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003danalysis$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?2025-10-05T08:11:37ZManaging cybersecurity resources : a cost-benefit analysisent://SD_ILS/0/SD_ILS:584412025-10-05T08:11:37Z2025-10-05T08:11:37ZGordon, Lawrence A.<br/>2006<br/>ISBN 9780071452854<br/>Privacy & data protection : a comprehensive analysis with special reference to the malaysian proposed lawent://SD_ILS/0/SD_ILS:1101282025-10-05T08:11:37Z2025-10-05T08:11:37ZAbu Bakar Munir Siti Hajar Mohd Yasin<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9789839088731<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1414082025-10-05T08:11:37Z2025-10-05T08:11:37ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvd :ent://SD_ILS/0/SD_ILS:1932442025-10-05T08:11:37Z2025-10-05T08:11:37ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780470613030<br/>Malware analyst's cookbook and dvdent://SD_ILS/0/SD_ILS:1679302025-10-05T08:11:37Z2025-10-05T08:11:37ZLigh, Michael W.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>