Search Results for operation. - Narrowed by: Computer securitySirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003doperation.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?2025-11-05T11:09:36ZAdvanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:1055632025-11-05T11:09:36Z2025-11-05T11:09:36ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Advanced guide to linux networking and securityent://SD_ILS/0/SD_ILS:841032025-11-05T11:09:36Z2025-11-05T11:09:36ZSawicki, Ed Wells, Nicholas<br/>2005<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781418835392<br/>Secure architectures with OpenBSDent://SD_ILS/0/SD_ILS:440842025-11-05T11:09:36Z2025-11-05T11:09:36ZPalmer, Brandon<br/>2004<br/>ISBN 9780321193667<br/>