Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security Linux 2 Application program interfaces (Computer software) 1
Application software -- 1 Cloud computing 1 Computer networks -- 1
more ...
Computer programs 1 Computer technicians 1 Data mining 1
Development -- 1 Electronic data processing personnel 1 Examinations 1
Machine learning 1 Security measures -- 1 Semantic computing 1
less ...
Showing 1 - 10 of 10 for search: '', query time: 0.13s
Cover Image
Security+ guide to network security fundamentals
by Ciampa, Mark D
Published 2009
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mastering Linux security and hardening
by Tevault, Donald A
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Linux Security fundamentals
by Clinton, David
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security in computing systems : challenges, approaches and solutions
by Biskup, Joachim
Published 2009
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Semantic control for the cybersecurity domain : investigation on the representativeness of a domain-specific terminology referring to lexical variation
by Lanza, Claudia
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Not with a bug, but with a sticker : attacks on machine learning systems and what to do about them
by Kumar, Ram Shankar Siva
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Secure data science : integrating cyber security and data science
by Thuraisngham, Bhavani
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Stepping through cybersecurity risk management : a systems thinking approach
by Bayuk, Jennifer L.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber operations : a case study approach
by Couretas, Jerry M.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Kubernetes security for dummies
by Kaelble, Steve
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Call Number: Q - Science Program: Computer Science, Degree Suggested Topics: Computer security
Library
8 Shah Alam 2 Bestari Jaya
Collection
10 Book
Item Category
8 EBOOK 1 OPEN SHELF 1 REFERENCE
Faculty
10 Communication, Visual Art & Computing, Faculty
Program
Computer Science, Degree
Call Number
Q - Science
Author
1 Bayuk, Jennifer L. 1 Biskup, Joachim 1 Ciampa, Mark D 1 Clinton, David 1 Couretas, Jerry M. 1 Kaelble, Steve more ... 1 Kumar, Ram Shankar Siva 1 Lanza, Claudia 1 Tevault, Donald A 1 Thuraisngham, Bhavani less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...