Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Security measures Computer networks -- 104 Computer security 80
Internet -- 14 Computer crimes -- 11 Prevention 11
more ...
Business enterprises -- 10 Data encryption (Computer science) 10 Data protection 9
Information technology -- 8 Internet of things -- 8 Wireless communication systems -- 8
Computer security -- 7 Access control 6 Computer network -- 6
Computer crimes 5 Investigation 5 Cloud computing -- 4
Computers -- 4 Libraries -- 4 Management 4
Mobile communication systems -- 4 Web sites -- 4 Wireless LANs -- 4
Application software -- 3 Cooperating objects (Computer systems) -- 3 Corporations -- 3
Cyberspace -- 3 Development 3 Electronic commerce -- 3
less ...
Showing 1 - 20 of 199 for search: '', query time: 0.14s
Cover Image
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
CWSP Certified Wireless Security Professional : official study guide (exam PWO-200)
by Moerschel, Grant
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
FISMA certification & accreditation handbook
by Taylor, Laura
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Dictionary of information security
by Slade, Robert
Published 2006
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Bandits on the information superhighway
by Barrett, Daniel J
Published 1996
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Control and security of e-commerce
by Smith, Gordon E
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Wireless security essentials : defending mobile systems from data piracy
by Vines, Russell Dean
Published 2002
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
E-mail rules : a business guide to managing policies, security, and legal issues for e-mail and digital communication
by Flynn, Nancy
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
The library's crisis communications planner : a PR guide for handling every emergency
by Thenell, Jan
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Managing the insider threat : no dark corners
by Catrantzos, Nick
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Retail security and loss prevention solutions
by Greggo, Alan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
CISSP all-in-one exam guide
by Harris, Shon
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mobile application security
by Dwivedi, Himanshu
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mobile device security : a comprehensive guide to securing your information in a moving world
by Fried, Stephen
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics and cyber crime
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows registry forensics : advanced digital forensic analysis of the Windows registry
by Carvey, Harlan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by Barret, Diane
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Setup and configuring virtual private network for Ericsson Expertise Center (M) Sdn Bhd
by Mohamad Khuzairi Jaafar
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next »
  • [10]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Security measures
Library
107 Bestari Jaya 92 Shah Alam
Collection
197 Book 1 Miscellaneous 1 Serials
Item Category
104 OPEN SHELF 89 EBOOK 5 REFERENCE 1 PRACTICAL TRAINING REPORT 1 THESIS
Faculty
173 Communication, Visual Art & Computing, Faculty 10 Business & Accountancy, Faculty 9 Engineering & Life Sciences, Faculty 2 Centre for Graduate Studies 2 Engineering, Faculty 2 Selangor Business School more ... 1 Education & Social Sciences, Faculty less ...
Program
64 Computer Science (Network Security and Digital Forensic), Degree 8 Computer Science, Degree 6 Business Management, Degree 5 Information Technology (Knowledge Management), Degree 4 Library Science, Diploma 3 Information Technology, Degree more ... 2 Administration Management, Diploma 2 Business Administration, Master 2 Information Technology, Diploma 2 Mechatronics Engineering, Degree 2 Mobile Technology, Diploma 1 Business Management, Diploma 1 Civil Engineering, Degree 1 Civil Engineering, Diploma 1 Computer Science (Software Engineering), Degree 1 Digital Graphic Design, Degree 1 Digital Graphic Design, Diploma 1 Electrical Engineering, Degree 1 Engineering, Doctor of Philosophy 1 Engineering, Master 1 Industrial Technology, Diploma 1 Information Technology (Supply Chain Management), Degree 1 Library Science, Degree 1 Management, Foundation 1 Mechanical Engineering, Degree 1 Mechatronic Engineering, Diploma 1 Multimedia Industry, Degree 1 Strategic Communication and Digital Design, Master less ...
Call Number
96 T - Technology 73 Q - Science 22 H - Social Science 4 Z - Library Science 1 K - Law 1 L - Education more ... 1 V - Naval Science less ...
Author
8 Stallings, William 2 Beaver, Kevin 2 Cache, Johnny 2 Catrantzos, Nick 2 Easttom, Chuck 2 Gupta, B. B more ... 2 Kahn, Miriam B 2 Kim, David 2 Kizza, Joseph Migga 2 Maiwald, Eric 2 Stamp, Mark 1 Amoroso, Edward G 1 Anagnostopoulos, Theodoros 1 Andreasson, Kim 1 Andress, Jason 1 Ashbaugh, Douglas A 1 Barret, Diane 1 Barrett, Daniel J 1 Bhaskar B.M 1 Birrane, Edward J. 1 Black, Uyless 1 Bradley, Tony 1 Bragg, Roberta 1 Buchanan, William J 1 Carr, Houston H 1 Carvey, Harlan 1 Cerra, Allison 1 Chantzis, Fotios 1 Cheruvu, Sunil 1 Ciampa, Mark less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...