Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security -- Computer networks -- 5 Security measures 5
Security measures -- 4 Cyberspace -- 3 Law and legislation 3
more ...
Management 3 Computer security 2 Cyberterrorism -- 2
Data processing 2 Machine learning -- 2 Moral and ethical aspects 2
Prevention -- 2 Artificial intelligence 1 Cloud computing -- 1
Cognitive science 1 Computational intelligence 1 Computer crimes -- 1
Congresses 1 Data mining 1 Data protection 1
Data protection -- 1 Distriuted processing 1 Electronic data processing -- 1
Engineering ethics 1 Examinations, questions, etc 1 Forecasting 1
Government policy 1 High performance computing 1 High performance computing -- 1
less ...
Showing 1 - 20 of 20 for search: '', query time: 0.27s
Cover Image
Information security management handbook
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
The ethics of cybersecurity
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : ethics, legal, risks, and policies
by Priyadarshini, Ishaani
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Conflicts, crimes and regulations in cyberspace
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Advances in cyber security and intelligent analytics
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Understanding cybersecurity law and digital privacy : a common law perspective
by Lukings, Melissa
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics : a data centric approach to information security
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CCSP certified cloud security professional all-in-one : exam guide
by Carter, Daniel
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and cognitive science
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
How to start your own cybersecurity consulting business : first-hand lessons from a burned-out ex-CISO
by Das, Ravindra
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security for Microsoft Windows system administrators : introduction to key information security concepts
by Rountree, Derrick
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W
Published 2014
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security 2020 : reduce security risks this decade
by Howard, Doug
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and high-performance computing environments : integrated innovations, practices, and applications
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computational intelligence for cybersecurity management and applications
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Philosophy of cybersecurity
by Olejnik, Lukasz
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Mastering Linux security and hardening : a practical guide to protecting your Linux system from cyber attacks
by Tevault, Donald A
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Machine learning for cyber security : 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, proceedings : 4th International Conference, ML4CS 2022, Guangz...
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Applying artificial intelligence in cybersecurity analytics and cyber threat detection
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Faculty: Communication, Visual Art & Computing, Faculty Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Computer security --
Library
15 Shah Alam 5 Bestari Jaya
Collection
20 Book
Item Category
15 EBOOK 4 OPEN SHELF 1 REFERENCE
Faculty
Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree
Call Number
16 Q - Science 2 T - Technology 1 H - Social Science 1 K - Law
Author
1 Amoroso, Edward G 1 Carter, Daniel 1 Das, Ravindra 1 Howard, Doug 1 Lukings, Melissa 1 Olejnik, Lukasz more ... 1 Priyadarshini, Ishaani 1 Rountree, Derrick 1 Singer, P. W 1 Tevault, Donald A less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...