Search Results for duplication - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dduplication$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?2025-11-09T02:30:04ZKESEDARAN KESELAMATAN SIBERent://SD_ILS/0/SD_ILS:2809152025-11-09T02:30:04Z2025-11-09T02:30:04ZMasnizah Mohd Masnizah Mohd., editor. Wan Fariza Paizi@Fauzi, editor.<br/>2019<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9789674127176<br/>Hacking exposed : web application security secrets & solutionsent://SD_ILS/0/SD_ILS:1412692025-11-09T02:30:04Z2025-11-09T02:30:04ZScambray, Joel<br/>2011<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9780071740647<br/>Enterprise java security : building secure J2EE applicationsent://SD_ILS/0/SD_ILS:436802025-11-09T02:30:04Z2025-11-09T02:30:04ZPistoia, Marco Nagaratnam, Nataraj Koved, Larry<br/>2004<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780321118899<br/>Hacking exposed web applicationsent://SD_ILS/0/SD_ILS:202412025-11-09T02:30:04Z2025-11-09T02:30:04ZScambray, Joel Shema, Mike<br/>2002<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9780072224382<br/>