Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Computer security -- Computer networks -- 10 Security measures -- 8
Management 7 Security measures 7 Computer security 4
more ...
Data protection 4 Congresses 3 Cyberspace -- 3
Internet -- 3 Law and legislation 3 Prevention -- 3
Certification 2 Cyberterrorism -- 2 Data processing 2
Data protection -- 2 Electronic data processing personnel -- 2 Examinations 2
Machine learning -- 2 Moral and ethical aspects 2 Software 2
Standards 2 Cloud computing -- 1 Cognitive science 1
Computational intelligence 1 Computer crimes -- 1 Computer program 1
Computer software -- 1 Confidential communications -- 1 Data mining 1
less ...
Showing 1 - 20 of 39 for search: '', query time: 0.12s
Cover Image
FISMA certification & accreditation handbook
by Taylor, Laura
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security management handbook
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Detect missing hardware Faculty of Industrial Information Technology laboratory (FIIT LLAB)
by Nur Sharina Sadali
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Information security management handbook
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Migrating isa server 2004-2006 kumpulan Karangkraf Sdn Bhd
by Mohd Faris Mahadi
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Security monitoring with Cisco security MARS
by Halleen, Gary
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security in embedded devices
by Gebotys, Catherine H
Published 2009
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
What every librarian should know about electronic privacy
by Woodward, Jeannette A
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital rights management : technological, economic, legal and political aspects
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
The ethics of cybersecurity
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA security+ study guide
by Dulaney, Emmett A
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mastering reverse engineering : re-engineer your ethical hacking skills
by Wong, Reginald
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security for software engineers
by Helfrich, James N.
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Implementing an information security management system : security management based on ISO 27001 guidelines
by Chopra, Abhishek
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber intelligence and information retrieval : proceedings of CIIR 2021
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering
by Bochman, Andrew A
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : ethics, legal, risks, and policies
by Priyadarshini, Ishaani
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and local government
by Norris, Donald F
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Conflicts, crimes and regulations in cyberspace
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Computer security --
Library
24 Shah Alam 15 Bestari Jaya
Collection
36 Book 1 AV Collection 1 Miscellaneous 1 Serials
Item Category
23 EBOOK 10 OPEN SHELF 5 REFERENCE 1 PRACTICAL TRAINING REPORT 1 PROJECT REPORT COLLECTION
Faculty
33 Communication, Visual Art & Computing, Faculty 1 Business & Accountancy, Faculty 1 Engineering & Life Sciences, Faculty 1 Engineering, Faculty 1 Unisel Graduate School Management
Program
19 Computer Science (Network Security and Digital Forensic), Degree 2 Computer Science, Degree 2 Information Technology, Degree 1 Information Technology, Diploma 1 Mechanical Engineering, Degree
Call Number
31 Q - Science 4 T - Technology 1 H - Social Science 1 J - Political Science 1 K - Law 1 Z - Library Science
Author
1 Amoroso, Edward G 1 Bochman, Andrew A 1 Carter, Daniel 1 Chopra, Abhishek 1 Das, Ravindra 1 Dulaney, Emmett A more ... 1 Gebotys, Catherine H 1 Halleen, Gary 1 Helfrich, James N. 1 Howard, Doug 1 Lukings, Melissa 1 Mohd Faris Mahadi 1 Nicastro, Felicia M 1 Norris, Donald F 1 Nur Sharina Sadali 1 Olejnik, Lukasz 1 Priyadarshini, Ishaani 1 Purser, Steve 1 Rountree, Derrick 1 Singer, P. W 1 Stallings, William 1 Taylor, Laura 1 Tevault, Donald A 1 Wong, Reginald 1 Woodward, Jeannette A less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...