Skip to content
VuFind
Advanced
Advanced
  • Search: "Securities --"
Suggested Topics... within your search.
Computer security 10 Computer networks -- 9 Security measures 9
Application software -- 3 Security measures -- 3 Computer security -- 2
more ...
Data encryption (Computer science) 2 Data mining 2 Data protection 2
Linux 2 Access control 1 Anomaly detection (Computer security) 1
Application program interfaces (Computer software) 1 Big data 1 Business enterprises -- 1
Cloud computing 1 Cloud computing -- 1 Computer networks 1
Computer programs 1 Computer technicians 1 Congresses 1
Data protection -- 1 Development -- 1 Electronic data processing personnel 1
Event processing (Computer science) 1 Examinations 1 Examinations -- 1
Extranets (Computer networks) 1 Information security 1 Information technology -- 1
less ...
Showing 1 - 20 of 25 for search: '"Securities --"', query time: 0.15s
Cover Image
Security in computing systems : challenges, approaches and solutions
by Biskup, Joachim
Published 2009
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Stepping through cybersecurity risk management : a systems thinking approach
by Bayuk, Jennifer L.
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber operations : a case study approach
by Couretas, Jerry M.
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network security : theory and practice
by Jie, Wang
Published 2009
Subjects: '; “...Computer networks -- Security measures...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Implementing an information security management system : security management based on ISO 27001 guidelines
by Chopra, Abhishek
Subjects: '; “...Computer security -- Management...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Mastering Linux security and hardening
by Tevault, Donald A
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Advanced API Security : OAuth 2.0 and beyond
by Siriwardena, Prabath
Subjects: '; “...Application software -- Security measures...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Linux Security fundamentals
by Clinton, David
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Semantic control for the cybersecurity domain : investigation on the representativeness of a domain-specific terminology referring to lexical variation
by Lanza, Claudia
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Not with a bug, but with a sticker : attacks on machine learning systems and what to do about them
by Kumar, Ram Shankar Siva
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Secure data science : integrating cyber security and data science
by Thuraisngham, Bhavani
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Wireless security
Published 2009
Subjects: '; “...Mobile communication system -- Security measure...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital transformation and modernization with IBM API connect : a practical guide to developing, deploying, and managing high-performance and secure hybrid-cloud APIs
by Kataoka, Bryon
Subjects: '; “...Application software -- Security measures...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity in the age of smart societies : proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022
Subjects: '; “...Computer networks -- Security measures -- Congresses...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Trust, security and privacy for big data
Subjects: '; “...Information security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security+ guide to network security fundamentals
by Ciampa, Mark D
Published 2009
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Authorization and access control : foundations, frameworks, and applications
by Mahalle, Parikshit N
Subjects: '; “...Computer networks -- Security measures...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security without obscurity : a guide to PKI operations
by Stapleton, Jeff
Subjects: '; “...Information technology -- Security measures...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cryptography and network security : principles and practice
by Stallings, William
Subjects: '; “...Computer networks -- Security measures...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA Security+ : guide to network security fundamentals
by TK5105.59
Subjects: '; “...Computer networks -- Security measures -- Examinations -- Study guides...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Program: Computer Science, Degree
Library
20 Shah Alam 5 Bestari Jaya
Collection
24 Book 1 Miscellaneous
Item Category
20 EBOOK 3 OPEN SHELF 1 PRACTICAL TRAINING REPORT 1 REFERENCE
Faculty
25 Communication, Visual Art & Computing, Faculty
Program
Computer Science, Degree
Call Number
18 Q - Science 6 T - Technology 1 C - Historical Sciences
Author
1 Bayuk, Jennifer L. 1 Biskup, Joachim 1 Chopra, Abhishek 1 Ciampa, Mark D 1 Clinton, David 1 Couretas, Jerry M. more ... 1 Jie, Wang 1 Kaelble, Steve 1 Kataoka, Bryon 1 Kumar, Ram Shankar Siva 1 Lanza, Claudia 1 Mahalle, Parikshit N 1 Mohamad Khuzairi Jaafar 1 Schneider, Patrick 1 Siriwardena, Prabath 1 Stallings, William 1 Stapleton, Jeff 1 TK5105.59 1 Tevault, Donald A 1 Thuraisngham, Bhavani less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...