Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security Security measures 19 Computer networks -- 15
Computer crimes -- 4 Data protection 3 Access control 2
more ...
Computer hackers 2 Computer security -- 2 Cryptography 2
Data encryption (Computer science) 2 Forensic sciences 2 Hackers 2
Investigation 2 Prevention 2 Accidents -- 1
Application software -- 1 Artificial intelligence 1 Automatic control 1
Blockchains (Databases) 1 Blockchains (Databases) -- 1 Cloud computing 1
Comptuter networks -- 1 Computer -- 1 Computer fraud 1
Computer network -- 1 Computer software -- 1 Computers -- 1
Cooperating objects (Computer systems) -- 1 Data privacy-social aspects 1 Deep learning (Machine learning) -- 1
less ...
Showing 1 - 20 of 46 for search: '', query time: 0.15s
Cover Image
The InfoSec handbook : an introduction to information security
by Rao, Umesh Hodeghatta
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Physical and logical security convergence : powered by enterprise security management
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy in dynamical systems
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Identity attack vectors : implementing an effective identity and access management solution
by Haber, Morey J
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber Security : 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer forensics jumpstart
Published 2011
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer and intrusion forensics
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Introduction to modern cryptography
by Katz, Jonathan
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security fundamentals
by Easttom, Chuck
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia,...
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Advances of DNA computing in cryptography
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Network security essentials : applications and standards
by Stallings, William
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security awareness design in the new normal age
by Goucher, Wendy
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security issues for wireless sensor networks
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Network security : private communication in a public world
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking for dummies
by Beaver, Kevin
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Software security : concepts & practices
by Khan, Suhel Ahmad
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Red Hat and IT security : with Red Hat Ansible, Red Hat Openshift, and Red Hat security auditing
by Chatterjee, Rithik
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Information security risk analysis
by Peltier, Thomas R
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Elements of computer security
by Salomon, David
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • Next »
  • [3]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Call Number: Q - Science Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Computer security
Library
33 Shah Alam 13 Bestari Jaya
Collection
46 Book
Item Category
33 EBOOK 14 OPEN SHELF
Faculty
46 Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree 1 Mathematics with Statistics, Degree
Call Number
Q - Science
Author
2 Easttom, Chuck 1 Beaver, Kevin 1 Buchanan, William J 1 Chatterjee, Rithik 1 Das, Ravindra 1 Goucher, Wendy more ... 1 Haber, Morey J 1 Howard, Doug 1 Hughes, Chris 1 Katz, Jonathan 1 Khan, Suhel Ahmad 1 Liu, Lei 1 Mammeri, Zoubir 1 Mitnick, Kevin D 1 Nielson, Seth James 1 Peltier, Thomas R 1 Pomerleau, Pierre-Luc 1 Poston, Howard E 1 Rao, Umesh Hodeghatta 1 Salomon, David 1 Stallings, William 1 Steinberg, Joseph 1 Tang, Alan 1 Tevault, Donald A 1 Tsantes, George K 1 Wilhelm, Thomas less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...