Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Data protection Computer security 10 Security measures 9
Computer networks -- 5 Computer security -- 4 Management 3
more ...
Privacy, Right of 3 Access control 2 Information technology -- 2
Internet -- 2 Security measures -- 2 Application software -- 1
Archival materials 1 Artificial intelligence 1 Backup processing alternatives 1
Comparative law 1 Computer -- 1 Computer network -- 1
Computer software -- 1 Congresses 1 Data protection -- 1
Data recovery (Computer science) 1 Data recovery (Computer science) -- 1 Database management 1
Development 1 Digital preservation 1 Electronic data processing -- 1
Electronic surveillance -- 1 Emergency management 1 Examinations -- 1
less ...
Showing 1 - 20 of 26 for search: '', query time: 0.12s
Cover Image
Simple computer security : disinfect your PC
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Surveillance studies : an overview
by Lyon, David
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security management handbook
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information security management handbook
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mobile device security : a comprehensive guide to securing your information in a moving world
by Fried, Stephen
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed Cisco network : Cisco security secrets & solutions
Published 2006
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital preservation
by Deegan, Marilyn
Published 2006
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
by Mitnick, Kevin D
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Digital data integrity : the evolution from passive protection to active management
by Little, David B
Published 2007
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy and data protection challenges in the distributed era
by Politou, Eugenia
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security and privacy applications for smart city development
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer and intrusion forensics
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Information assurance for the enterprise : a roadmap to information security
by Schou, Corey
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security awareness : applying practical security in your world
by Ciampa, Mark
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Advances in artificial intelligence for privacy protection and security
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Disaster recovery planning : preparing for the unthinkable
by Toigo, Jon William
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Data protection : ensuring data availability
by De Guise, Preston
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA Security+ : guide to network security fundamentals
by TK5105.59
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Software security : concepts & practices
by Khan, Suhel Ahmad
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Principles of computer security CompTIA security+ and beyond lab manual
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Data protection
Library
15 Bestari Jaya 11 Shah Alam
Collection
25 Book 1 AV Collection
Item Category
13 OPEN SHELF 11 EBOOK 2 REFERENCE
Faculty
23 Communication, Visual Art & Computing, Faculty 2 Engineering & Life Sciences, Faculty
Program
5 Computer Science (Network Security and Digital Forensic), Degree 3 Computer Science, Degree 1 Civil Engineering, Diploma 1 Computer Science (Software Engineering), Degree 1 Information Technology (Supply Chain Management), Degree 1 Information Technology, Master more ... 1 Library Science, Degree 1 Library Science, Diploma 1 Media & Communication, Diploma 1 Mobile Technology, Diploma less ...
Call Number
15 Q - Science 4 T - Technology 2 C - Historical Sciences 2 H - Social Science 1 J - Political Science 1 K - Law more ... 1 Z - Library Science less ...
Author
1 Ciampa, Mark 1 Ctvrtnik, Mikulas 1 De Guise, Preston 1 Deegan, Marilyn 1 Fried, Stephen 1 Khan, Suhel Ahmad more ... 1 Little, David B 1 Lyon, David 1 Mitnick, Kevin D 1 Pfleeger, Charles P 1 Politou, Eugenia 1 Salomon, David 1 Schou, Corey 1 TK5105.59 1 Toigo, Jon William less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...