Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer networks -- Computer security -- Security measures -- 7
Security measures 4 Internet -- 3 Certification 2
more ...
Computer security 2 Electronic data processing personnel -- 2 Examinations 2
Artificial intelligence 1 Computer crimes -- 1 Congresses 1
Cyberspace -- 1 Cyberterrorism -- 1 Data mining 1
Data processing 1 Data protection 1 Distriuted processing 1
Electronic data processing -- 1 Evaluation 1 Industrial applications 1
Machine learning -- 1 Prevention 1 Prevention -- 1
Software 1 Standards 1 Technologial innovations 1
Technological innovations 1 Vocational guidance 1 Wide area networks industry 1
less ...
Showing 1 - 11 of 11 for search: '', query time: 0.11s
Cover Image
FISMA certification & accreditation handbook
by Taylor, Laura
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Migrating isa server 2004-2006 kumpulan Karangkraf Sdn Bhd
by Mohd Faris Mahadi
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Security monitoring with Cisco security MARS
by Halleen, Gary
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA security+ study guide
by Dulaney, Emmett A
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Advances in cyber security and intelligent analytics
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics : a data centric approach to information security
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
How to start your own cybersecurity consulting business : first-hand lessons from a burned-out ex-CISO
by Das, Ravindra
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security : principles and practice
by Stallings, William
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W
Published 2014
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity in the age of smart societies : proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Applying artificial intelligence in cybersecurity analytics and cyber threat detection
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Computer networks -- Suggested Topics: Computer security --
Library
6 Shah Alam 5 Bestari Jaya
Collection
10 Book 1 Miscellaneous
Item Category
5 EBOOK 3 OPEN SHELF 2 REFERENCE 1 PRACTICAL TRAINING REPORT
Faculty
10 Communication, Visual Art & Computing, Faculty 1 Business & Accountancy, Faculty
Program
5 Computer Science (Network Security and Digital Forensic), Degree 1 Computer Science, Degree 1 Information Technology, Degree
Call Number
8 Q - Science 3 T - Technology
Author
1 Das, Ravindra 1 Dulaney, Emmett A 1 Halleen, Gary 1 Mohd Faris Mahadi 1 Singer, P. W 1 Stallings, William more ... 1 Taylor, Laura less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...