Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security Security measures 30 Computer networks -- 20
Computer crimes -- 13 Investigation 8 Forensic sciences 4
more ...
Prevention 4 Data protection 3 Access control 2
Artificial intelligence -- 2 Blockchains (Databases) 2 Computer hackers 2
Computer security -- 2 Cryptography 2 Data encryption (Computer science) 2
Digital forensic science 2 Hackers 2 Industrial applications 2
Internet of things -- 2 Machine learning -- 2 Risk assessment 2
Accidents -- 1 Application software -- 1 Artificial intelligence 1
Authentication 1 Automatic control 1 Automatic machinery -- 1
Biometric identification -- 1 Blockchains (Databases) -- 1 Business & economics 1
less ...
Showing 1 - 20 of 65 for search: '', query time: 0.16s
Cover Image
Machine learning forensics for law enforcement, security, and intelligence
by Mena, Jesus
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics for handheld devices
by Doherty, Eamon P
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed computer forensics
by Philipp, Aaron
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows registry forensics : advanced digital forensic analysis of the Windows registry
by Carvey, Harlan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by Barret, Diane
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Designing network security
by Kaeo, Merike
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyberspace and cybersecurity
by Kostopoulos, George K
Published 2013
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Building a practical information security program
by Andress, Jason
Published 2017
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The InfoSec handbook : an introduction to information security
by Rao, Umesh Hodeghatta
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Physical and logical security convergence : powered by enterprise security management
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
by Macaulay, Tyson
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy in dynamical systems
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Identity attack vectors : implementing an effective identity and access management solution
by Haber, Morey J
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics explained
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber Security : 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer forensics jumpstart
Published 2011
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer and intrusion forensics
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Introduction to modern cryptography
by Katz, Jonathan
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security fundamentals
by Easttom, Chuck
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia,...
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • Next »
  • [4]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Faculty: Communication, Visual Art & Computing, Faculty Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Computer security
Library
44 Shah Alam 21 Bestari Jaya
Collection
65 Book
Item Category
44 EBOOK 22 OPEN SHELF
Faculty
Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree 1 Mathematics with Statistics, Degree
Call Number
46 Q - Science 10 H - Social Science 9 T - Technology
Author
2 Easttom, Chuck 1 Andress, Jason 1 Barret, Diane 1 Beaver, Kevin 1 Brathwaite, Shimon 1 Buchanan, William J more ... 1 Carvey, Harlan 1 Chatterjee, Rithik 1 Das, Ravindra 1 DeFranco, Joanna F. 1 Doherty, Eamon P 1 Goucher, Wendy 1 Grimes, Roger A. 1 Haber, Morey J 1 Howard, Doug 1 Hughes, Chris 1 Kaeo, Merike 1 Katz, Jonathan 1 Khan, Suhel Ahmad 1 King, Steve 1 Kostopoulos, George K 1 Liu, Lei 1 Macaulay, Tyson 1 Mammeri, Zoubir 1 Mena, Jesus 1 Mitnick, Kevin D 1 Nielson, Seth James 1 Peltier, Thomas R 1 Philipp, Aaron 1 Pomerleau, Pierre-Luc less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...