Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Access control Computer networks -- 6 Security measures 6
Computer security 5 Computers -- 4 Internet -- 3
more ...
Medical records -- 3 Privacy, Right of 3 Data processing 2
Data protection 2 Electronic information resources -- 2 Archival materials 1
Archives -- 1 Authentication 1 Automation 1
Cellular telephone systems -- 1 Common Language Runtime (Computer science) 1 Communication in medicine 1
Computer -- 1 Computer network -- 1 Computer programs 1
Computer-assisted instruction -- 1 Digital humanities 1 Distance education -- 1
Educational technology -- 1 Electronic data processing departments -- 1 Firewalls (Computer security) 1
Identification -- 1 Internet of things -- 1 Intranets (Computer networks) -- 1
less ...
Showing 1 - 18 of 18 for search: '', query time: 0.10s
Cover Image
AAA/ Radius server configuration for Malaysia Airports Holding Berhad Subang (MAHB)
by Nuurzahirah Anuar
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Privacy and confidentiality perspectives : archivists & archival records
Published 2005
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cellular authentication for mobile and Internet services
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Internet and Intranet security management : risks and solutions
by Janczewski, Lech
Published 2000
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Electronic health records for quality nursing & health care
by Kelley, Tiffany
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Managing risk and information security : protect to enable
by Harkins, Malcolm
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Protecting your health privacy : citizen?s guide to safeguarding the security of your medical information
by Klosek, Jacqueline
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Biometrics
by Woodward, John D
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Access and control in digital humanities
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Linux firewalls
by Ziegler, Robert L
Published 2002
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Network security : private communication in a public world
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Electronic health records and communication for better health care : proceedings of EuroRec 01
Published 2001
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Authorization and access control : foundations, frameworks, and applications
by Mahalle, Parikshit N
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Elements of computer security
by Salomon, David
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Managed code rootkits : hooking into runtime environments
by Metula, Erez
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Archives and records : privacy, personality rights, and access
by Ctvrtnik, Mikulas
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Secure data management for online learning applications
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Beyond cybersecurity : protecting your digital business
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Access control
Library
10 Bestari Jaya 8 Shah Alam
Collection
17 Book 1 Serials
Item Category
9 OPEN SHELF 8 EBOOK 1 PROJECT REPORT COLLECTION
Faculty
10 Communication, Visual Art & Computing, Faculty 2 Engineering & Life Sciences, Faculty 2 Health Sciences, Faculty 1 Education & Social Sciences, Faculty 1 Selangor Business School
Program
2 Computer Science (Network Security and Digital Forensic), Degree 1 Business Administration, Master 1 Computer Science, Degree 1 Electronics Engineering, Degree 1 Library Science, Degree 1 Library Science, Diploma more ... 1 Nursing, Diploma less ...
Call Number
6 Q - Science 5 T - Technology 3 R - Medicine 2 C - Historical Sciences 1 A - General Works 1 L - Education
Author
1 Ctvrtnik, Mikulas 1 Harkins, Malcolm 1 Janczewski, Lech 1 Kelley, Tiffany 1 Klosek, Jacqueline 1 Mahalle, Parikshit N more ... 1 Metula, Erez 1 Nuurzahirah Anuar 1 Salomon, David 1 Woodward, John D 1 Ziegler, Robert L less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...