Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security Security measures 14 Computer networks -- 10
Computer crimes -- 8 Investigation 5 Forensic sciences 4
more ...
Computer hackers 2 Data protection 2 Access control 1
Accidents -- 1 Automatic control 1 Automatic machinery -- 1
Cell phones 1 Computer -- 1 Computer network -- 1
Computer security -- 1 Cyberspace -- 1 Data processing 1
Electronic evidence 1 Forecasting 1 Forensic sciences -- 1
Hackers 1 Internet -- 1 Investigation -- 1
Investigations 1 Machine learning 1 Management 1
Methodology 1 Operating systems (Computers) 1 Penetration testing (Computer security) 1
less ...
Showing 1 - 20 of 22 for search: '', query time: 0.19s
Cover Image
Machine learning forensics for law enforcement, security, and intelligence
by Mena, Jesus
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics for handheld devices
by Doherty, Eamon P
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed computer forensics
by Philipp, Aaron
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows registry forensics : advanced digital forensic analysis of the Windows registry
by Carvey, Harlan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by Barret, Diane
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Designing network security
by Kaeo, Merike
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyberspace and cybersecurity
by Kostopoulos, George K
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computer forensics jumpstart
Published 2011
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer and intrusion forensics
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia,...
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security risk analysis
by Peltier, Thomas R
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Elements of computer security
by Salomon, David
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Global e-security : 4th International Conference, ICGes 2008, London, UK, June 23-25, 2008
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security and digital forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : first international conference, ISDF 2009, Lon...
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Ninja hacking : unconventional penetration testing tactics and techniques
by Wilhelm, Thomas
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Introduction to security and network forensics
by Buchanan, William J
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security and policy driven computing
by Liu, Lei
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security fundamentals
by Easttom, Chuck
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Gray hat hacking : the ethical hacker's handbook
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Faculty: Communication, Visual Art & Computing, Faculty Item Category: OPEN SHELF Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Computer security
Library
21 Bestari Jaya 1 Shah Alam
Collection
22 Book
Item Category
OPEN SHELF 1 EBOOK
Faculty
Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree
Call Number
14 Q - Science 5 H - Social Science 3 T - Technology
Author
1 Barret, Diane 1 Buchanan, William J 1 Carvey, Harlan 1 Doherty, Eamon P 1 Easttom, Chuck 1 Howard, Doug more ... 1 Kaeo, Merike 1 Kostopoulos, George K 1 Liu, Lei 1 Macaulay, Tyson 1 Mena, Jesus 1 Mitnick, Kevin D 1 Peltier, Thomas R 1 Philipp, Aaron 1 Salomon, David 1 Wilhelm, Thomas less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...