Skip to content
VuFind
Advanced
Advanced
  • Search: "Computation --"
Suggested Topics... within your search.
Computer security 65 Security measures 54 Computer networks -- 41
Computer crimes -- 31 Computer security -- 20 Investigation 19
more ...
Forensic sciences 8 Prevention 8 Security measures -- 7
Computer crimes 6 Computer networks 6 Data protection 6
Internet -- 6 Artificial intelligence 4 Computer software -- 4
Cyberspace -- 4 Data encryption (Computer science) 4 Data processing 4
Law and legislation 4 Machine learning -- 4 Management 4
Moral and ethical aspects 4 Computational intelligence 3 Computers 3
Congresses 3 Digital forensic science 3 Hackers 3
Industrial applications 3 Investigation -- 3 Machine learning 3
less ...
Showing 1 - 20 of 152 for search: '"Computation --"', query time: 0.14s
Cover Image
Discovering computers 2018 : digital technology, data, and devices
Published 2018
Subjects: '; “...Computers...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Gray hat hacking : the ethical hacker's handbook
Subjects: '; “...Computer hackers...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computer networks
by Tanenbaum, Andrew S
Published 2011
Subjects: '; “...Computer networks...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy in dynamical systems
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer network
by Shinde, S. S
Subjects: '; “...Computer networks...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer networks : a systems approach
by Peterson, Larry L
Subjects: '; “...Computer networks...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Network security essentials : applications and standards
by Stallings, William
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security issues for wireless sensor networks
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Discovering cybersecurity : a technical introduction for the absolute beginner
by Nielson, Seth James
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
by Hughes, Chris
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The zero trust framework and privileged access management (PAM)
by Das, Ravindra
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics explained
Subjects: '; “...Computer crimes -- Investigation...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security 2020 : reduce security risks this decade
by Howard, Doug
Published 2011
Subjects: '; “...Computer security -- Forecasting...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Computational intelligence for cybersecurity management and applications
Subjects: '; “...Computer security -- Management...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics and cyber crime
Published 2011
Subjects: '; “...Computer crimes -- Investigation...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by Barret, Diane
Published 2010
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security and digital forensics : first international conference, ISDF 2009, London, United Kingdom, September 7-9, 2009 : first international conference, ISDF 2009, Lon...
Published 2010
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Python for cybersecurity : using Python for cyber offense and defense
by Poston, Howard E
Subjects: '; “...Python (Computer program language)...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Database security : protecting against internal and external threats
by Padallan, Jocelyn O
Subjects: '; “...Computers -- Security -- General...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed computer forensics
by Philipp, Aaron
Published 2010
Subjects: '; “...Computer crimes -- Investigation...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next »
  • [8]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Program: Computer Science (Network Security and Digital Forensic), Degree
Library
108 Shah Alam 44 Bestari Jaya
Collection
151 Book 1 AV Collection
Item Category
109 EBOOK 45 OPEN SHELF 1 CD-ROM 1 REFERENCE
Faculty
152 Communication, Visual Art & Computing, Faculty 1 Engineering & Life Sciences, Faculty
Program
Computer Science (Network Security and Digital Forensic), Degree 1 Bioinformatics, Degree 1 Computer Science, Degree 1 Mathematics with Statistics, Degree
Call Number
80 Q - Science 39 T - Technology 29 H - Social Science 2 K - Law 1 P - Language and Literature 1 Z - Library Science
Author
2 Aweya, James 2 Das, Ravindra 2 Easttom, Chuck 2 Li, Ming 2 Stallings, William 1 Alos, Elisa more ... 1 Amoroso, Edward G 1 Andreasson, Kim 1 Andress, Jason 1 Ashbourn, Julian, 1 Bandler, John 1 Barret, Diane 1 Beaver, Kevin 1 Brathwaite, Shimon 1 Buchanan, William J 1 Carter, Daniel 1 Carvey, Harlan 1 Chatterjee, Rithik 1 Curtis, George 1 Davies, Joshua 1 De Guise, Preston 1 DeFranco, Joanna F. 1 Doherty, Eamon P 1 Edwards, Graeme 1 Garbis, Jason, 1 Goucher, Wendy 1 Gragido, Will 1 Grimes, Roger A. 1 Haber, Morey J 1 Halder, Debarati less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...