Search Results for cyber - Narrowed by: EnglishSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dcyber$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?dt=list2025-12-15T15:58:53ZCyber spookent://SD_ILS/0/SD_ILS:3056112025-12-15T15:58:53Z2025-12-15T15:58:53ZAng, Josh<br/>2022<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Sri Pantai Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul<br/>ISBN 9789672934257<br/>Cyber feverent://SD_ILS/0/SD_ILS:1765962025-12-15T15:58:53Z2025-12-15T15:58:53ZPhilip, Gillian, 1964-<br/>2010<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN 9780237542627<br/>Cyber Risk Leadersent://SD_ILS/0/SD_ILS:2749462025-12-15T15:58:53Z2025-12-15T15:58:53ZShamane Tan<br/>2019<br/>Perpustakaan Kuala Lumpur Pustaka KL @ PPR Pinggiran Bukit Jalil<br/>ISBN 9780648595311<br/>Cyber-Thief Showdownent://SD_ILS/0/SD_ILS:2739742025-12-15T15:58:53Z2025-12-15T15:58:53ZStilton,Geronimo<br/>2018<br/>Perpustakaan Kuala Lumpur (Kanak-Kanak)<br/>ISBN 9781338215199<br/>Hello cyber grannieent://SD_ILS/0/SD_ILS:2456392025-12-15T15:58:53Z2025-12-15T15:58:53ZTyrrell, Jane<br/>2016<br/>Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Pusat Komuniti Sri Semarak<br/>ISBN 9789670999111<br/>Cyber crime secretsent://SD_ILS/0/SD_ILS:2223582025-12-15T15:58:53Z2025-12-15T15:58:53ZTownsend, John 1955-<br/>2011<br/>Perpustakaan Lembah Pantai<br/>ISBN 9781445103891<br/>The cyber cafe ideaent://SD_ILS/0/SD_ILS:1401442025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu<br/>2009<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Kuala Lumpur<br/>ISBN 9789833796885<br/>Cyber laws of malaysiaent://SD_ILS/0/SD_ILS:858822025-12-15T15:58:53Z2025-12-15T15:58:53ZMalaysia Malaysia. Akta Tandatangan Digital, 1997 (Akta 562) Legal Research Board<br/>2006<br/>Perpustakaan Jabatan<br/>ISBN 9789678912723<br/>The cyber cafe ideaent://SD_ILS/0/SD_ILS:2007492025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961-<br/>2013<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail Perpustakaan Internet Bergerak Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Kuala Lumpur, Cawangan Setiawangsa Perpustakaan Kuala Lumpur, Cawangan Sri Pantai<br/>ISBN 9789670492056<br/>The cyber gang bookent://SD_ILS/0/SD_ILS:2332612025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Vellu, 1961- author<br/>2016<br/>Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Sri Pantai Perpustakaan Kuala Lumpur, Cawangan Gombak Setia Perpustakaan Kuala Lumpur, Cawangan Desa Tun Razak Perpustakaan Kuala Lumpur, Cawangan Setiawangsa<br/>ISBN 9789670959054<br/>Cyber terrorism : policy and technical perspectiveent://SD_ILS/0/SD_ILS:2335512025-12-15T15:58:53Z2025-12-15T15:58:53ZShahrin Sahib Rabiah Ahmad Zahri Yunos<br/>2015<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Tun Razak Perpustakaan Kuala Lumpur, Cawangan Muhibbah Perpustakaan Medan Idaman Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789670257464<br/>Cephalox the cyber squid 1ent://SD_ILS/0/SD_ILS:2024182025-12-15T15:58:53Z2025-12-15T15:58:53ZBlade, Adam<br/>2013<br/>ISBN 9781408318485<br/>Cyber Law : text and casesent://SD_ILS/0/SD_ILS:112372025-12-15T15:58:53Z2025-12-15T15:58:53ZFerrera, Gerald R. Lichtenstein, Stephen D. Reder, Margo E.K. August, Ray Schiano, William T.<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780324012972<br/>Nature-Inspired Cyber Security and Resiliencyent://SD_ILS/0/SD_ILS:3064092025-12-15T15:58:53Z2025-12-15T15:58:53ZEl-Sayed M. El-Alfy<br/>Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781785616389<br/>C and C++ multimedia cyber classrooment://SD_ILS/0/SD_ILS:911692025-12-15T15:58:53Z2025-12-15T15:58:53Z1996<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780132313742<br/>Understanding Cyber Risk : Protecting Your Corporate Assetsent://SD_ILS/0/SD_ILS:2672792025-12-15T15:58:53Z2025-12-15T15:58:53ZKoehler, Thomas R., 1968- author.<br/>2018<br/>Perpustakaan Jabatan<br/>ISBN 9781472477798<br/>Cyber crime fighters : tales from the trencesent://SD_ILS/0/SD_ILS:1187852025-12-15T15:58:53Z2025-12-15T15:58:53ZDonovan, Felicia Bernier, Kristyn<br/>2009<br/>ISBN 9780789739223<br/>Cyber Security Applications For Industry 4.0ent://SD_ILS/0/SD_ILS:3071312025-12-15T15:58:53Z2025-12-15T15:58:53ZR, Sujatha<br/>ISBN 9781032066202<br/>Cyber security culture : counteracting cyber threats through organizational learning and trainingent://SD_ILS/0/SD_ILS:2023112025-12-15T15:58:53Z2025-12-15T15:58:53ZTrim, Peter Upton, David.<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781409456940<br/>Cyber war will not take place / Thomas Rid.ent://SD_ILS/0/SD_ILS:2203432025-12-15T15:58:53Z2025-12-15T15:58:53ZRid, Thomas, 1975-, author<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781849042802<br/>Cyber war : the next threat to national security and what to do about itent://SD_ILS/0/SD_ILS:1852592025-12-15T15:58:53Z2025-12-15T15:58:53ZClarke, Richard A. (Richard Alan), 1951- Knake, Robert K.<br/>Exposes America’s burgeoning new cyber warfare capability and its vulnerabilities and documents the first skirmishes that have taken place in cyberspace.<br/>2012<br/>ISBN 9780061962240<br/>Cyberspace and the state : toward a strategy for cyber-powerent://SD_ILS/0/SD_ILS:2110212025-12-15T15:58:53Z2025-12-15T15:58:53ZBetz, David, 1969- Stevens, Tim, 1973-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415525305<br/>Digital communications : from e-mail to the cyber communityent://SD_ILS/0/SD_ILS:1473782025-12-15T15:58:53Z2025-12-15T15:58:53ZMitra, Ananda, 1960-<br/>This book looks at the digital tools used during interpersonal communication, such as cell phones, electronic mail, chat rooms, and social networking Web sites and how blogs and podcasts can relay messages to the masses.<br/>2010<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780816067848<br/>Cyber-bullying : issues and solutions for the school, the classroom and the homeent://SD_ILS/0/SD_ILS:1143682025-12-15T15:58:53Z2025-12-15T15:58:53ZShaheen Sharif<br/>2008<br/>Perpustakaan Lembah Pantai<br/>ISBN 9780415424912<br/>Cyber-safe kids, cyber-savvy teens : helping young people learn to use the Internet safely and responsiblyent://SD_ILS/0/SD_ILS:1383642025-12-15T15:58:53Z2025-12-15T15:58:53ZWillard, Nancy E.<br/>2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780787994174<br/>Cyber rules : strategies for excelling at E-Businessent://SD_ILS/0/SD_ILS:1291652025-12-15T15:58:53Z2025-12-15T15:58:53ZSiebel, Thomas M. House, Pat<br/>1999<br/>ISBN 9780385494120<br/>Cyber crime investigations : bridging the gaps between security professional, law enforcement and prosecutorsent://SD_ILS/0/SD_ILS:1343602025-12-15T15:58:53Z2025-12-15T15:58:53Z2007<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597491334<br/>The Facebook Trickent://SD_ILS/0/SD_ILS:2646312025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu<br/>2016<br/>Perpustakaan Internet Bergerak Pustaka KL @ Keramat<br/>ISBN 9789670492728<br/>Be Careful Who You Chat Withent://SD_ILS/0/SD_ILS:2912202025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>Never Trust A Facebook Friendent://SD_ILS/0/SD_ILS:2912212025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>The Alien Force Gameent://SD_ILS/0/SD_ILS:2912222025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>The Money Planent://SD_ILS/0/SD_ILS:2912232025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>The MyTube Experienceent://SD_ILS/0/SD_ILS:2912242025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>The Online Revengeent://SD_ILS/0/SD_ILS:2912252025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>The Photo Maker CDent://SD_ILS/0/SD_ILS:2912262025-12-15T15:58:53Z2025-12-15T15:58:53ZKumara Velu, 1961- author.<br/>2016<br/>Pustaka KL @ Keramat<br/>ISBN 9789670492681<br/>Threat vectorent://SD_ILS/0/SD_ILS:2009512025-12-15T15:58:53Z2025-12-15T15:58:53ZClancy, Tom, 1947- Greaney, Mark.<br/>Jack Ryan has only just moved back into the Oval Office when he is faced with a new international threat. An aborted coup in the People's Republic of China has left President Wei Zhen Lin with no choice but to agree with the expansionist policies of General Su Ke Quiang. They have declared the South China Sea a protectorate and are planning an invasion of Taiwan. The Ryan administration is determined to thwart these Chinese ambitions, but the stakes are dangerously high as hundreds of Chinese anti-ship missiles thwart the US Navy's plans to protect the island. Meanwhile, Chinese cyber warfare experts have launched a devastating attack on American infrastructure. It's a new combat arena, but it's every bit as deadly as any that has gone before. Jack Ryan, Jr. and his colleagues at the Campus may be just the wild card that his father needs to stack the deck. There's just one problem: someone knows about the off-the-books intelligence agency and may be ready to blow their cover sky high.<br/>2502 2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780718176945<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:2123022025-12-15T15:58:53Z2025-12-15T15:58:53ZYang, Christopher C.<br/>The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text.Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).<br/>2013<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780124047020<br/>The impact of technology on relationships in educational settingsent://SD_ILS/0/SD_ILS:2043662025-12-15T15:58:53Z2025-12-15T15:58:53ZCostabile, Angela Spears, Barbara A.<br/>"As the linguistic, cognitive and social elements of our lives are transformed by new and emerging technologies, educational settings are also challenged to respond to the issues that have arisen as a consequence. This book focuses on that challenge: using psychological theory as a lens to highlight the positive uses of new technologies in relationships and educational settings, and to advocate technological learning opportunities and social support where the misuse and abuse of ICT occurs. The Impact of Technology on Relationships in Educational Settings sets out to explore the role of ICTs in relationship forming, social networking and social relationships within our schools and has grown out of the European Cooperation in Science and Technology (COST); Action on cyberbullying, involving 28 participating countries, and two non-COST countries, of which Australia is one. This cutting edge international text offers cross-cultural, psychological perspectives on the positive uses of new and emerging technologies to improve social relationships and examples of best practice to prevent virtual bullying. This comes at a time when much of the focus in current writings has been on the more negative aspects which have emerged as new technologies evolved: cyberbullying, cyber-aggression and cybersafety concerns. This text is ideally suited to researchers and practiitioners in the fields of Educational and developmental psychology, as well as those specialising in educational technology and the sociology of education"-- Provided by publisher.<br/>2012<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780415610087<br/>The Internet book of life : use the Web to grow richer, smarter, healthier, and happierent://SD_ILS/0/SD_ILS:1861112025-12-15T15:58:53Z2025-12-15T15:58:53ZMcDermott, Irene E., 1959-<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780910965897<br/>Start your own wedding consultant business : your step-by-step guide to successent://SD_ILS/0/SD_ILS:2112872025-12-15T15:58:53Z2025-12-15T15:58:53ZSandlin, Eileen Figure. Entrepreneur Press.<br/>2011<br/>ISBN 9781599184272<br/>Cybercrimeent://SD_ILS/0/SD_ILS:1415112025-12-15T15:58:53Z2025-12-15T15:58:53ZRoss, Jeffrey Ian.<br/>2010<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780791094068<br/>