Skip to content
VuFind
Advanced
Advanced
  • Search:
Suggested Topics... within your search.
Security measures -- Computer networks -- 15 Computer security -- 8
Internet -- 4 Examinations 3 Management 3
more ...
Prevention -- 3 Certification 2 Computer crimes -- 2
Computer security 2 Cyberterrorism -- 2 Data processing 2
Data protection 2 Electronic data processing personnel -- 2 Government policy 2
National security -- 2 Prevention 2 Public works -- 2
Access control 1 Access control -- 1 Cargo theft -- 1
Cloud computing -- 1 Computer crimes 1 Computer programs 1
Computer technicians 1 Computer-assisted instruction -- 1 Computers -- 1
Congresses 1 Corporations -- 1 Cyberspace -- 1
less ...
Showing 1 - 20 of 23 for search: '', query time: 0.10s
Cover Image
Security+ guide to network security fundamentals
by Ciampa, Mark D
Published 2009
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Migrating isa server 2004-2006 kumpulan Karangkraf Sdn Bhd
by Mohd Faris Mahadi
Published 2008
Call Number: Loading...
Located: Loading...
Loading...
Show QR Code

Cover Image
Pharmaceutical supply chain : drug quality and security act
by Kuglin, Fred A
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA security+ study guide
by Dulaney, Emmett A
Published 2011
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Critical infrastructure system security and resiliency
by Biringer, Betty E
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cargo crime : security and theft prevention
by Coughlin, John J
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Corporate security management : challenges, risks, and strategies
by Cabric, Marko
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber security : threats and responses for government and business
by Caravelli, Jack,
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Strategic security management : a risk assessment guide for decision makers
by Vellani, Karim H
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity : public sector threats and responses
by Andreasson, Kim
Published 2012
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Outsouring information security
by Axelrod, C. Warren
Published 2004
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity ethics : an introduction
by Manjikian, Mary
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security analytics : a data centric approach to information security
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Deep learning approaches for security threats in IoT environments
by Abdel-Basset, Mohamed
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CCSP certified cloud security professional all-in-one : exam guide
by Carter, Daniel
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
CompTIA Security+ : guide to network security fundamentals
by TK5105.59
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
How to start your own cybersecurity consulting business : first-hand lessons from a burned-out ex-CISO
by Das, Ravindra
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Securing the nation's critical infrastructures : a guide for the 2021-2025 Administration
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security : principles and practice
by Stallings, William
Published 2012
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cybersecurity and cyberwar : what everyone needs to know
by Singer, P. W
Published 2014
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • Next »
  • [2]
Search Tools: Get RSS Feed

Narrow Search

Remove Filters
Suggested Topics: Security measures --
Library
18 Shah Alam 5 Bestari Jaya
Collection
22 Book 1 Miscellaneous
Item Category
17 EBOOK 4 OPEN SHELF 2 REFERENCE 1 PRACTICAL TRAINING REPORT
Faculty
14 Communication, Visual Art & Computing, Faculty 3 Business & Accountancy, Faculty 2 Education & Social Sciences, Faculty 2 Engineering & Life Sciences, Faculty 1 Biomedical & Health Sciences, Faculty
Program
7 Computer Science (Network Security and Digital Forensic), Degree 3 Computer Science, Degree 1 Administration Management, Diploma 1 Business Management, Degree 1 Business Management, Diploma 1 Electrical & Electronic Engineering, Diploma more ... 1 Electrical Engineering, Degree 1 Industrial Psychology, Degree 1 Information Technology, Degree 1 Psychology, Diploma less ...
Call Number
9 Q - Science 6 H - Social Science 6 T - Technology 1 C - Historical Sciences 1 L - Education
Author
1 Abdel-Basset, Mohamed 1 Andreasson, Kim 1 Axelrod, C. Warren 1 Biringer, Betty E 1 Cabric, Marko 1 Caravelli, Jack, more ... 1 Carter, Daniel 1 Ciampa, Mark D 1 Coughlin, John J 1 Das, Ravindra 1 Dulaney, Emmett A 1 Kuglin, Fred A 1 Manjikian, Mary 1 Mohd Faris Mahadi 1 Shoemaker, Dan 1 Singer, P. W 1 Stallings, William 1 TK5105.59 1 Vellani, Karim H less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...