Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Prevention Security measures 9 Computer crimes -- 7
Computer security 4 Computer networks -- 3 Corporations -- 2
more ...
Employee crimes -- 2 Sabotage in the workplace -- 2 Artificial intelligence 1
Artificial intelligence -- 1 Authentication 1 Comptuter networks -- 1
Computer crimes 1 Computer hackers 1 Computer security -- 1
Cyberbullying -- 1 Electronic mail messages -- 1 Espionage 1
Government information -- 1 Government policy 1 Internet -- 1
Moral and ethical aspects 1 Penetration testing (Computer security) 1 Phishing -- 1
Psychological aspects 1 Retail trade -- 1 Safety measures 1
Security measures -- 1 Security systems 1 Shoplifting -- 1
less ...
Showing 1 - 13 of 13 for search: '', query time: 0.15s
Cover Image
The counterterrorism handbook : tactics, procedures, and techniques
by Bolz, Frank
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Managing the insider threat : no dark corners
by Catrantzos, Nick
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Retail security and loss prevention solutions
by Greggo, Alan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybercrime and espionage : an analysis of subversive multivector threats
by Gragido, Will
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : public sector threats and responses
by Andreasson, Kim
Published 2012
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Losing the cybersecurity war : and what we can do to stop it
by King, Steve
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Managing the insider threat : no dark corners and the rising tide menace
by Catrantzos, Nick
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Ninja hacking : unconventional penetration testing tactics and techniques
by Wilhelm, Thomas
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Evidence-based cybersecurity : foundations, research, and practice
by Pomerleau, Pierre-Luc
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyberpredators and their prey
by Shapiro, Lauren R
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Fighting Phishing : everything you can do to fight social engineering and phishing
by Grimes, Roger A.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Generative AI and cyberbullying
by Das, Ravindra
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Applying artificial intelligence in cybersecurity analytics and cyber threat detection
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Program: Computer Science (Network Security and Digital Forensic), Degree Suggested Topics: Prevention
Library
8 Shah Alam 5 Bestari Jaya
Collection
13 Book
Item Category
8 EBOOK 5 OPEN SHELF 1 REFERENCE
Faculty
13 Communication, Visual Art & Computing, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree
Call Number
8 H - Social Science 3 Q - Science 2 T - Technology
Author
2 Catrantzos, Nick 1 Andreasson, Kim 1 Bolz, Frank 1 Das, Ravindra 1 Gragido, Will 1 Greggo, Alan more ... 1 Grimes, Roger A. 1 King, Steve 1 Pomerleau, Pierre-Luc 1 Shapiro, Lauren R 1 Wilhelm, Thomas less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...