Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security 44 Security measures 42 Computer networks -- 28
Computer crimes -- 15 Computer security -- 15 Investigation 9
more ...
Prevention 8 Internet -- 6 Security measures -- 6
Computer networks 5 Digital forensic science 5 Law and legislation 5
Artificial intelligence 4 Computer software -- 4 Congresses 4
Industrial applications 4 Internet of things 4 Internet of things -- 4
Machine learning 4 Machine learning -- 4 Moral and ethical aspects 4
Technological innovations 4 Wireless communication systems -- 4 Artificial intelligence -- 3
Blockchains (Databases) 3 Computational intelligence 3 Computer crimes 3
Data encryption (Computer science) 3 Data protection 3 Data protection -- 3
less ...
Showing 1 - 20 of 152 for search: '', query time: 0.13s
Cover Image
Building a practical information security program
by Andress, Jason
Published 2017
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Remote sensing technology in forensic investigations : geophysical techniques to locate clandestine graves and hidden evidence
by Davenport, G. Clark
Published 2018
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Game development using Python
by Parker, Jim R
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The ethics of cybersecurity
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The InfoSec handbook : an introduction to information security
by Rao, Umesh Hodeghatta
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Physical and logical security convergence : powered by enterprise security management
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Physical database design : the database professional's guide to exploiting indexes, views storage, and more
by Lightstone, Sam
Call Number: Loading...
Located: Loading...
Get full text
Show QR Code

Cover Image
Dark Web investigation
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber forensics : from data to digital evidence
by Marcella, Albert J
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy in dynamical systems
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The human factor of cybercrime
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Organized crime and terrorist networks
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Smart card security : applications, attacks, and countermeasures
by Gupta, B. B
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybercrime investigators handbook
by Edwards, Graeme
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity attacks - red team strategies : a practical guide to building a penetration testing program having homefield advantage
by Rehberger, Johann
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics for the internet of everything
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Identity attack vectors : implementing an effective identity and access management solution
by Haber, Morey J
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques
by Troia, Vinny
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cellular internet of things : from massive deployments to critical 5G applications
by Liberg, Olof
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Migrating a two-tier application to azure : a hands-on walkthrough of azure infrastructure, platform, and container services
by Tender, Peter De
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next »
  • [8]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Item Category: EBOOK Program: Computer Science (Network Security and Digital Forensic), Degree
Library
150 Shah Alam 2 Bestari Jaya
Collection
150 Book 2 AV Collection
Item Category
EBOOK 3 OPEN SHELF
Faculty
151 Communication, Visual Art & Computing, Faculty 2 Engineering & Life Sciences, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree 2 Mathematics with Statistics, Degree 1 Bioinformatics, Degree
Call Number
67 Q - Science 54 T - Technology 24 H - Social Science 4 K - Law 2 Z - Library Science 1 P - Language and Literature
Author
3 Das, Ravindra 2 Aweya, James 2 Li, Ming 2 Stallings, William 2 Stamp, Mark 1 Alos, Elisa more ... 1 Andreasson, Kim 1 Andress, Jason 1 Ashbourn, Julian, 1 Bandler, John 1 Beaver, Kevin 1 Berman, Paul R 1 Bieker, Felix 1 Brathwaite, Shimon 1 Carter, Daniel 1 Catrantzos, Nick 1 Chancellor, Arthur S 1 Chatterjee, Rithik 1 Davenport, G. Clark 1 De Guise, Preston 1 DeFranco, Joanna F. 1 Easttom, Chuck 1 Edwards, Graeme 1 Feldman, Marc 1 Finger, Matthias 1 Garbis, Jason, 1 Goucher, Wendy 1 Grimes, Roger A. 1 Gupta, B. B 1 Haber, Morey J less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...