Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Security measures Computer networks -- 106 Computer security 80
Internet -- 14 Computer crimes -- 12 Prevention 12
more ...
Business enterprises -- 10 Data encryption (Computer science) 10 Data protection 9
Computer security -- 8 Information technology -- 8 Internet of things -- 8
Wireless communication systems -- 8 Access control 6 Computer network -- 6
Cloud computing -- 5 Computer crimes 5 Investigation 5
Management 5 Application software -- 4 Computers -- 4
Libraries -- 4 Mobile communication systems -- 4 Web sites -- 4
Wireless LANs -- 4 Cooperating objects (Computer systems) -- 3 Corporations -- 3
Cyberspace -- 3 Development 3 Electronic commerce -- 3
less ...
Showing 1 - 20 of 202 for search: '', query time: 0.14s
Cover Image
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
CWSP Certified Wireless Security Professional : official study guide (exam PWO-200)
by Moerschel, Grant
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
FISMA certification & accreditation handbook
by Taylor, Laura
Published 2007
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Dictionary of information security
by Slade, Robert
Published 2006
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Bandits on the information superhighway
by Barrett, Daniel J
Published 1996
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Control and security of e-commerce
by Smith, Gordon E
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Wireless security essentials : defending mobile systems from data piracy
by Vines, Russell Dean
Published 2002
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
E-mail rules : a business guide to managing policies, security, and legal issues for e-mail and digital communication
by Flynn, Nancy
Published 2003
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
The library's crisis communications planner : a PR guide for handling every emergency
by Thenell, Jan
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Managing the insider threat : no dark corners
by Catrantzos, Nick
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Retail security and loss prevention solutions
by Greggo, Alan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
CISSP all-in-one exam guide
by Harris, Shon
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Hacking exposed wireless : wireless security secrets & solutions
by Cache, Johnny
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mobile application security
by Dwivedi, Himanshu
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Mobile device security : a comprehensive guide to securing your information in a moving world
by Fried, Stephen
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Digital forensics and cyber crime
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows registry forensics : advanced digital forensic analysis of the Windows registry
by Carvey, Harlan
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Virtualization and forensics : a digital forensic investigator's guide to virtual environments
by Barret, Diane
Published 2010
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber attacks : protecting national infrastructure
by Amoroso, Edward G
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Setup and configuring virtual private network for Ericsson Expertise Center (M) Sdn Bhd
by Mohamad Khuzairi Jaafar
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next »
  • [11]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Security measures
Library
107 Bestari Jaya 95 Shah Alam
Collection
200 Book 1 Miscellaneous 1 Serials
Item Category
104 OPEN SHELF 92 EBOOK 5 REFERENCE 1 PRACTICAL TRAINING REPORT 1 THESIS
Faculty
176 Communication, Visual Art & Computing, Faculty 10 Business & Accountancy, Faculty 9 Engineering & Life Sciences, Faculty 2 Centre for Graduate Studies 2 Engineering, Faculty 2 Selangor Business School more ... 1 Education & Social Sciences, Faculty less ...
Program
65 Computer Science (Network Security and Digital Forensic), Degree 9 Computer Science, Degree 6 Business Management, Degree 5 Information Technology (Knowledge Management), Degree 4 Library Science, Diploma 3 Information Technology, Degree more ... 2 Administration Management, Diploma 2 Business Administration, Master 2 Information Technology, Diploma 2 Mechatronics Engineering, Degree 2 Mobile Technology, Diploma 1 Business Management, Diploma 1 Civil Engineering, Degree 1 Civil Engineering, Diploma 1 Computer Science (Software Engineering), Degree 1 Digital Graphic Design, Degree 1 Digital Graphic Design, Diploma 1 Electrical Engineering, Degree 1 Engineering, Doctor of Philosophy 1 Engineering, Master 1 Industrial Management, Degree 1 Industrial Technology, Diploma 1 Information Technology (Supply Chain Management), Degree 1 Library Science, Degree 1 Management, Foundation 1 Mechanical Engineering, Degree 1 Mechatronic Engineering, Diploma 1 Multimedia Industry, Degree 1 Strategic Communication and Digital Design, Master less ...
Call Number
97 T - Technology 75 Q - Science 22 H - Social Science 4 Z - Library Science 1 K - Law 1 L - Education more ... 1 V - Naval Science less ...
Author
8 Stallings, William 2 Beaver, Kevin 2 Cache, Johnny 2 Catrantzos, Nick 2 Easttom, Chuck 2 Gupta, B. B more ... 2 Kahn, Miriam B 2 Kim, David 2 Kizza, Joseph Migga 2 Maiwald, Eric 2 Stamp, Mark 1 Amoroso, Edward G 1 Anagnostopoulos, Theodoros 1 Andreasson, Kim 1 Andress, Jason 1 Ashbaugh, Douglas A 1 Barret, Diane 1 Barrett, Daniel J 1 Bhaskar B.M 1 Birrane, Edward J. 1 Black, Uyless 1 Bradley, Tony 1 Bragg, Roberta 1 Buchanan, William J 1 Carr, Houston H 1 Carvey, Harlan 1 Cerra, Allison 1 Chantzis, Fotios 1 Cheruvu, Sunil 1 Ciampa, Mark less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...