Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security -- Computer networks -- 10 Management 7
Security measures 7 Security measures -- 7 Computer security 4
more ...
Data protection 4 Congresses 3 Cyberspace -- 3
Internet -- 3 Law and legislation 3 Prevention -- 3
Computer crimes -- 2 Cyberterrorism -- 2 Data processing 2
Data protection -- 2 Machine learning -- 2 Moral and ethical aspects 2
Standards 2 Artificial intelligence 1 Certification 1
Cloud computing -- 1 Cognitive science 1 Computational intelligence 1
Computer program 1 Data mining 1 Distriuted processing 1
Electronic data processing -- 1 Electronic data processing personnel -- 1 Engineering ethics 1
less ...
Showing 1 - 20 of 34 for search: '', query time: 0.15s
Cover Image
FISMA certification & accreditation handbook
by Taylor, Laura
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security management handbook
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Detect missing hardware Faculty of Industrial Information Technology laboratory (FIIT LLAB)
by Nur Sharina Sadali
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Information security management handbook
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Migrating isa server 2004-2006 kumpulan Karangkraf Sdn Bhd
by Mohd Faris Mahadi
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Security monitoring with Cisco security MARS
by Halleen, Gary
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital rights management : technological, economic, legal and political aspects
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The ethics of cybersecurity
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security for software engineers
by Helfrich, James N.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Implementing an information security management system : security management based on ISO 27001 guidelines
by Chopra, Abhishek
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber intelligence and information retrieval : proceedings of CIIR 2021
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering
by Bochman, Andrew A
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : ethics, legal, risks, and policies
by Priyadarshini, Ishaani
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Conflicts, crimes and regulations in cyberspace
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Advances in cyber security and intelligent analytics
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Understanding cybersecurity law and digital privacy : a common law perspective
by Lukings, Melissa
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics : a data centric approach to information security
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CCSP certified cloud security professional all-in-one : exam guide
by Carter, Daniel
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and cognitive science
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Faculty: Communication, Visual Art & Computing, Faculty Suggested Topics: Computer security --
Library
21 Shah Alam 13 Bestari Jaya
Collection
31 Book 1 AV Collection 1 Miscellaneous 1 Serials
Item Category
21 EBOOK 8 OPEN SHELF 3 REFERENCE 1 PRACTICAL TRAINING REPORT 1 PROJECT REPORT COLLECTION
Faculty
Communication, Visual Art & Computing, Faculty
Program
20 Computer Science (Network Security and Digital Forensic), Degree 2 Computer Science, Degree 2 Information Technology, Degree 1 Information Technology, Diploma
Call Number
29 Q - Science 3 T - Technology 1 H - Social Science 1 K - Law
Author
1 Amoroso, Edward G 1 Bochman, Andrew A 1 Carter, Daniel 1 Chopra, Abhishek 1 Das, Ravindra 1 Halleen, Gary more ... 1 Helfrich, James N. 1 Howard, Doug 1 Lukings, Melissa 1 Mohd Faris Mahadi 1 Nicastro, Felicia M 1 Nur Sharina Sadali 1 Olejnik, Lukasz 1 Priyadarshini, Ishaani 1 Rountree, Derrick 1 Singer, P. W 1 Stallings, William 1 Taylor, Laura 1 Tevault, Donald A less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...