Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer networks -- Security measures 36 Computer security 20
Computer crimes -- 8 Security measures -- 6 Computer security -- 5
more ...
Internet -- 4 Investigation 4 Prevention 3
Computer crimes 2 Data encryption (Computer science) 2 Machine learning -- 2
Access control 1 Accidents -- 1 Artificial intelligence 1
Authentication 1 Automatic control 1 Blockchains (Databases) -- 1
Business enterprises -- 1 Computational intelligence 1 Computers -- 1
Cyberspace -- 1 Cyberterrorism -- 1 Data mining 1
Data processing 1 Data protection 1 Deep learning (Machine learning) -- 1
Digital communications 1 Digital communications -- 1 Digital forensic science 1
less ...
Showing 1 - 20 of 41 for search: '', query time: 0.14s
Cover Image
Digital forensics and cyber crime
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows registry forensics : advanced digital forensic analysis of the Windows registry
by Carvey, Harlan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Implementing SSL/TLS Using Cryptography and PKI
by Davies, Joshua
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Designing network security
by Kaeo, Merike
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Network attacks and defenses : a hands-on approach
by Trabelsi, Zouheir
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Building a practical information security program
by Andress, Jason
Published 2017
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage
by Rehberger, Johann
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Guide to computer network security
by Kizza, Joseph Migga
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : public sector threats and responses
by Andreasson, Kim
Published 2012
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer forensics jumpstart
Published 2011
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cryptography and network security : principles and practice
by Stallings, William
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security fundamentals
by Easttom, Chuck
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Information security handbook
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia,...
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Zero Trust security : an enterprise guide
by Garbis, Jason,
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security awareness design in the new normal age
by Goucher, Wendy
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity ethics : an introduction
by Manjikian, Mary
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Advances in cyber security and intelligent analytics
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
What every engineer should know about cyber security and digital forensics
by DeFranco, Joanna F.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics : a data centric approach to information security
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • Next »
  • [3]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Faculty: Communication, Visual Art & Computing, Faculty Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Computer networks --
Library
28 Shah Alam 13 Bestari Jaya
Collection
41 Book
Item Category
28 EBOOK 15 OPEN SHELF
Faculty
Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree
Call Number
19 Q - Science 18 T - Technology 4 H - Social Science
Author
2 Easttom, Chuck 1 Andreasson, Kim 1 Andress, Jason 1 Beaver, Kevin 1 Buchanan, William J 1 Carvey, Harlan more ... 1 Das, Ravindra 1 Davies, Joshua 1 De Guise, Preston 1 DeFranco, Joanna F. 1 Garbis, Jason, 1 Goucher, Wendy 1 Kaeo, Merike 1 King, Steve 1 Kizza, Joseph Migga 1 Liu, Lei 1 Manjikian, Mary 1 Peltier, Thomas R 1 Poston, Howard E 1 Rehberger, Johann 1 Shoemaker, Dan 1 Singer, P. W 1 Stallings, William 1 Steinberg, Joseph 1 Thakur, Kutub 1 Thakur, Kutub, Dr 1 Trabelsi, Zouheir 1 Xu, Shengjie less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...