Skip to content
VuFind
Advanced
Advanced
  • Search: "Computer Security"
Suggested Topics... within your search.
Computer security 172 Security measures 94 Computer networks -- 65
Computer security -- 39 Computer crimes -- 16 Data protection 14
more ...
Internet -- 10 Investigation 9 Security measures -- 9
Data encryption (Computer science) 8 Management 8 Access control 6
Computer hackers 6 Computer software -- 6 Artificial intelligence 5
Cloud computing -- 5 Computers -- 5 Cyberspace -- 5
Development 5 Forensic sciences 5 Operating systems (Computers) 5
Penetration testing (Computer security) 5 Prevention 5 Application software -- 4
Computer crimes 4 Cryptography 4 Cyber intelligence (Computer security) 4
Data mining 4 Examinations 4 Firewalls (Computer security) 4
less ...
Showing 1 - 20 of 226 for search: '"Computer Security"', query time: 0.14s
Cover Image
Microsoft Windows security inside out for Windows XP and Windows 2000
by Bott, Ed
Published 2002
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Privacy in dynamical systems
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Computer security : art and science
by Bishop, Matt
Published 2003
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Windows security portable reference
by O'Dea, Michael
Published 2003
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
HackNotes : Linux and Unix security portable reference
by Dhanjani, Nitesh
Published 2003
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Linux system security : an administrator's guide to open source security tools
by Mann, Scott
Published 2003
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Network security essentials : applications and standards
by Stallings, William
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Security issues for wireless sensor networks
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Maximum Windows 2000 security
Published 2002
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Microsoft Windows 2000 security technical reference
Published 2000
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Security in computing systems : challenges, approaches and solutions
by Biskup, Joachim
Published 2009
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Introduction to computer security
by Goodrich, Michael T
Published 2011
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber security essentials
Published 2011
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Loading...
Preview
Preview
Preview
Show QR Code

Cover Image
The business of cyber : why you should question what your security team are telling you
by Fagan, Peter
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
by Parker, Carey
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Discovering cybersecurity : a technical introduction for the absolute beginner
by Nielson, Seth James
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Effective vulnerability management : managing risk in the vulnerable digital ecosystem
by Hughes, Chris
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Stepping through cybersecurity risk management : a systems thinking approach
by Bayuk, Jennifer L.
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Cyber operations : a case study approach
by Couretas, Jerry M.
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

Cover Image
Tobias on locks and insecurity engineering : understanding and preventing design vulnerabilities in locks, safes, and security hardware
by Tobias, Marc W.
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Get full text
Preview
Preview
Preview
Show QR Code

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next »
  • [12]
Search Tools: Get RSS Feed

Narrow Search

Library
114 Shah Alam 112 Bestari Jaya
Collection
222 Book 2 Miscellaneous 1 AV Collection 1 Serials
Item Category
111 EBOOK 103 OPEN SHELF 11 REFERENCE 2 PRACTICAL TRAINING REPORT 1 PROJECT REPORT COLLECTION
Faculty
208 Communication, Visual Art & Computing, Faculty 5 Business & Accountancy, Faculty 5 Engineering & Life Sciences, Faculty 2 Selangor Business School 1 Education & Social Sciences, Faculty 1 Engineering, Faculty more ... 1 Unisel Graduate School Management less ...
Program
85 Computer Science (Network Security and Digital Forensic), Degree 14 Computer Science, Degree 6 Information Technology, Degree 4 Information Technology, Diploma 3 Business Management, Degree 3 Mechanical Engineering, Degree more ... 2 Business Administration, Master 2 Mobile Technology, Diploma 1 Business Management, Diploma 1 Computer Science (Software Engineering), Degree 1 Industrial Technology, Diploma 1 Information Technology (Knowledge Management), Degree 1 Information Technology (Supply Chain Management), Degree 1 Information Technology, Master 1 Mathematics with Statistics, Degree 1 Mechatronic Engineering, Diploma 1 Mechatronics Engineering, Degree less ...
Call Number
171 Q - Science 34 T - Technology 16 H - Social Science 2 K - Law 1 J - Political Science 1 R - Medicine more ... 1 Z - Library Science less ...
Author
7 Stallings, William 2 Beaver, Kevin 2 Das, Ravindra 2 Easttom, Chuck 2 Howard, Michael 2 Kim, David more ... 2 Maiwald, Eric 2 Mitnick, Kevin D 2 Tevault, Donald A 1 Amoroso, Edward G 1 Andress, Jason 1 Ashbaugh, Douglas A 1 Ashbourn, Julian, 1 Bahi, Jacques M 1 Barret, Diane 1 Bayuk, Jennifer L. 1 Bhaskar B.M 1 Bhatnagar, Shilpa 1 Bishop, Matt 1 Biskup, Joachim 1 Bochman, Andrew A 1 Bott, Ed 1 Bradley, Tony 1 Brancik, Kenneth C 1 Brathwaite, Shimon 1 Britz, Marjie 1 Buchanan, William J 1 Carter, Daniel 1 Carvey, Harlan 1 Cerra, Allison less ...
Year of Publication

Search Options

  • Advanced Search

Need Help?

  • Search Tips

Loading...