Search Results for Business enterprises -- Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dBusiness$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ps$003d300?dt=list2024-04-24T16:11:09ZResponsive security : be ready to be secureent://SD_ILS/0/SD_ILS:8372952024-04-24T16:11:09Z2024-04-24T16:11:09Zby Meng-Chow Kang author<br/>Author Meng-Chow Kang author<br/>Format: Books<br/>Call Number HF5548.37 K36 2014<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466584303<br/>Information security for managersent://SD_ILS/0/SD_ILS:8083282024-04-24T16:11:09Z2024-04-24T16:11:09Zby Workman, Michael<br/>Author Workman, Michael, Phelps, Daniel C., Gathegi, John N.<br/>Format: Books<br/>Call Number HF5548.37 W67 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9780763793012<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:8211582024-04-24T16:11:09Z2024-04-24T16:11:09Zby Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>IT governance : an international guide to data security and ISO27001/ISO27002ent://SD_ILS/0/SD_ILS:8064042024-04-24T16:11:09Z2024-04-24T16:11:09Zby Calder, Alan<br/>Author Calder, Alan, Watkins, Steve<br/>Format: Books<br/>Call Number QA76.9.A25 C342 2012<br/>Edition 5th ed.<br/>Publisher Kogan Page,<br/>Publication Date 2012<br/>ISBN 9780749464851 9780749464868<br/>Threats, countermeasures, and advances in applied information securityent://SD_ILS/0/SD_ILS:8084992024-04-24T16:11:09Z2024-04-24T16:11:09Zby Gupta, Manish, 1978-<br/>Author Gupta, Manish, 1978-, Walp, John, 1967-, Sharman, Raj<br/>Format: Books<br/>Call Number HD30.2 T47 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781466609785<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:7986332024-04-24T16:11:09Z2024-04-24T16:11:09Zby Speed, Tyler Justin<br/>Author Speed, Tyler Justin<br/>Format: Books<br/>Call Number TK5105.59 S643 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439809822<br/>Securing customer trust in e-commerce transactionsent://SD_ILS/0/SD_ILS:8390672024-04-24T16:11:09Z2024-04-24T16:11:09Zby Muhammad Bello Mai<br/>Author Muhammad Bello Mai, Zuraini Ismail, Assoc.Prof.Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HF5548.32 M843 2012<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan Perisian) - Universiti Teknologi Malaysia, 2012<br/>Securing customer trust in e-commerce transactionsent://SD_ILS/0/SD_ILS:8390702024-04-24T16:11:09Z2024-04-24T16:11:09Zby Muhammad Bello Mai<br/>Author Muhammad Bello Mai<br/>Format: Books<br/>Call Number CP 034551 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan Perisian) - Universiti Teknologi Malaysia, 2012<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:7773062024-04-24T16:11:09Z2024-04-24T16:11:09Zby Halpert, Ben, 1986-<br/>Author Halpert, Ben, 1986-<br/>Format: Books<br/>Call Number HF5548.37 A93 2011<br/>Publisher John Wiley & Sons,<br/>Publication Date 2011<br/>ISBN 9780470874745<br/>Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:3632442024-04-24T16:11:09Z2024-04-24T16:11:09Zby Kouns, Jake<br/>Author Kouns, Jake, Minoli, Daniel<br/>Format: Books<br/>Call Number HF5548.37 K68 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780471762546<br/>The art of enterprise information architecture : a systems-based approach for unlocking business insightent://SD_ILS/0/SD_ILS:7599082024-04-24T16:11:09Z2024-04-24T16:11:09Zby Godinez, Mario<br/>Author Godinez, Mario<br/>Format: Books<br/>Call Number HD30.2 A784 2010<br/>Publisher IBM Press, Pearson,<br/>Publication Date 2010<br/>ISBN 9780137035717<br/>SAP security configuration and deployment : the IT administrator's guide to best practicesent://SD_ILS/0/SD_ILS:2814012024-04-24T16:11:09Z2024-04-24T16:11:09Zby Wun-Young, Leslie<br/>Author Wun-Young, Leslie<br/>Format: Books<br/>Call Number HF5548.37 S38 2009<br/>Publisher Syngress Publishing Inc.,<br/>Publication Date 2009<br/>ISBN 9781597492843<br/>Enterprise information security and privacyent://SD_ILS/0/SD_ILS:3003732024-04-24T16:11:09Z2024-04-24T16:11:09Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren, Bayuk, Jennifer L., Schutzer, Daniel, 1940-<br/>Format: Books<br/>Call Number HF5548.37 E57 2009<br/>Publisher Artech House,<br/>Publication Date 2009<br/>ISBN 9781596931909<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2828952024-04-24T16:11:09Z2024-04-24T16:11:09Zby Brotby, W. Krag<br/>Author Brotby, W. Krag<br/>Format: Books<br/>Call Number HD30.2 B78 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420052855<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-04-24T16:11:09Z2024-04-24T16:11:09Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Trust and new technologies : marketing and management on the Internet and mobile mediaent://SD_ILS/0/SD_ILS:3238292024-04-24T16:11:09Z2024-04-24T16:11:09Zby Kautonen, Teemu<br/>Author Kautonen, Teemu, Karjaluoto, Heikki<br/>Format: Books<br/>Call Number HF5415.1265 T78 2008<br/>Publisher Northampton, MA : Edward Elgar,<br/>Publication Date 2008<br/>ISBN 9781847205681<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:3011122024-04-24T16:11:09Z2024-04-24T16:11:09Zby Khadraoui, Djamel<br/>Author Khadraoui, Djamel, Herrmann, Francine<br/>Format: Books<br/>Call Number HF5548.37 A38 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:1021872024-04-24T16:11:09Z2024-04-24T16:11:09Zby Layton, Timothy P.<br/>Author Layton, Timothy P.<br/>Format: Books<br/>Call Number HF5548.37 L39 2007<br/>Publisher Auerbach Pub.,<br/>Publication Date 2007<br/>ISBN 9780849370878<br/>Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidenceent://SD_ILS/0/SD_ILS:1030892024-04-24T16:11:09Z2024-04-24T16:11:09Zby Chang, Elizabeth<br/>Author Chang, Elizabeth, Dillon, Tharam S., 1943-, Hussain, Farookh K.<br/>Format: Books<br/>Call Number HF5548.32 C424 2006<br/>Publisher John Wiley & Sons Inc.,<br/>Publication Date 2006<br/>ISBN 9780470015476<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:1749582024-04-24T16:11:09Z2024-04-24T16:11:09Zby Dubrawsky, Ido<br/>Author Dubrawsky, Ido<br/>Format: Books<br/>Call Number TK5105.59 D47 2006<br/>Publisher Syngress,<br/>Publication Date 2006<br/>ISBN 9781597491006<br/>IT governance : a managers guide to data security and BS 7799/ISO 17799ent://SD_ILS/0/SD_ILS:1269642024-04-24T16:11:09Z2024-04-24T16:11:09Zby Calder, Alan, 1957-<br/>Author Calder, Alan, 1957-, Watkins, Steve, 1970-<br/>Format: Books<br/>Call Number QA76.9.A25 C346 2005<br/>Edition 3rd ed.<br/>Publisher Kogan Page,<br/>Publication Date 2005<br/>ISBN 9780749446505<br/>The executive guide to information security : threats, challenges, and solutionsent://SD_ILS/0/SD_ILS:4304852024-04-24T16:11:09Z2024-04-24T16:11:09Zby Egan, Mark<br/>Author Egan, Mark<br/>Format: Books<br/>Call Number HF5548.32 E32 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321304513<br/>Advances in security and payment methods for mobile commerceent://SD_ILS/0/SD_ILS:4490692024-04-24T16:11:09Z2024-04-24T16:11:09Zby Hu, Wen Chen, 1960-<br/>Author Hu, Wen Chen, 1960-, Lee, Chung-Wei, 1965-, Kou, Weidong<br/>Format: Books<br/>Call Number HF5548.34 A38 2005<br/>Publisher Idea Group Publishing,<br/>Publication Date 2005<br/>ISBN 9781591403456<br/>The ethical hack : a framework for business value penetration testingent://SD_ILS/0/SD_ILS:3893822024-04-24T16:11:09Z2024-04-24T16:11:09Zby Tiller, James S.<br/>Author Tiller, James S.<br/>Format: Books<br/>Call Number TK5105.59 T54 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849316098<br/>Securing your business with CISCO ASA and PIX firewallsent://SD_ILS/0/SD_ILS:1350502024-04-24T16:11:09Z2024-04-24T16:11:09Zby Abelar, Greg<br/>Author Abelar, Greg<br/>Format: Books<br/>Call Number TK5105.59 A23 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587052149<br/>Control and security of e-commerceent://SD_ILS/0/SD_ILS:3941972024-04-24T16:11:09Z2024-04-24T16:11:09Zby Smith, Gordon E. (Gordon Edward)<br/>Author Smith, Gordon E. (Gordon Edward)<br/>Format: Books<br/>Call Number HF5548.32 S64 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780471180906<br/>Digital defence what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:2266372024-04-24T16:11:09Z2024-04-24T16:11:09Zby Parenty, Thomas J.<br/>Author Parenty, Thomas J.<br/>Format: Books<br/>Call Number HD30.38 P37<br/>Publisher Harvard Business School Press,<br/>Publication Date 2003<br/>ISBN 9781578517794<br/>Penerokaan bangunan persatuan pelajar secara realiti mayaent://SD_ILS/0/SD_ILS:212942024-04-24T16:11:09Z2024-04-24T16:11:09Zby Cik Ku Fatimah Che Ku Yen<br/>Author Cik Ku Fatimah Che Ku Yen<br/>Format: Visual Materials<br/>Call Number MFL 11991<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Securing E-business systems : a guide for managers and executivesent://SD_ILS/0/SD_ILS:3707262024-04-24T16:11:09Z2024-04-24T16:11:09Zby Braithwaite, Timothy, 1942-<br/>Author Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Call Number HF5548.32 B72 2002<br/>Publisher John Wiley,<br/>Publication Date 2002<br/>ISBN 9780471072980<br/>Enterprise security : solaris operating environment, security journal, solarisent://SD_ILS/0/SD_ILS:3941872024-04-24T16:11:09Z2024-04-24T16:11:09Zby Noordergraaf, Alex<br/>Author Noordergraaf, Alex<br/>Format: Books<br/>Call Number QA76.9.A25 E57 2002<br/>Publisher Sun Microsystems Press,<br/>Publication Date 2002<br/>ISBN 9780131000926<br/>Sistem perniagaan komputer secara atas talianent://SD_ILS/0/SD_ILS:3244682024-04-24T16:11:09Z2024-04-24T16:11:09Zby Mohd. Erwandi Marwan<br/>Author Mohd. Erwandi Marwan<br/>Format: Books<br/>Call Number HF5548.32 M47 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Online computer shopent://SD_ILS/0/SD_ILS:160712024-04-24T16:11:09Z2024-04-24T16:11:09Zby Chan, Kian Koon<br/>Author Chan, Kian Koon<br/>Format: Visual Materials<br/>Call Number MFL 11202<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2001<br/>Security and privacy for e-commerceent://SD_ILS/0/SD_ILS:1700042024-04-24T16:11:09Z2024-04-24T16:11:09Zby Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G57 2001<br/>Publisher Wiley,<br/>Publication Date 2001<br/>ISBN 9780471384212<br/>Non-repudiation in electronic commerceent://SD_ILS/0/SD_ILS:3170732024-04-24T16:11:09Z2024-04-24T16:11:09Zby Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>Sistem kawalan keperluan bahan di MTB Sdn. Bhdent://SD_ILS/0/SD_ILS:165272024-04-24T16:11:09Z2024-04-24T16:11:09Zby Azlina Hamzah<br/>Author Azlina Hamzah<br/>Format: Visual Materials<br/>Call Number MFL 10930<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Electronic commerce relationships : trust by designent://SD_ILS/0/SD_ILS:1418492024-04-24T16:11:09Z2024-04-24T16:11:09Zby Keen, Peter<br/>Author Keen, Peter<br/>Format: Books<br/>Call Number HF5548.32 E53 2000<br/>Publisher Prentice Hall,<br/>Publication Date 2000<br/>ISBN 9780130170378<br/>Implimentasi keselamatan komunikasi diantara agenent://SD_ILS/0/SD_ILS:1482572024-04-24T16:11:09Z2024-04-24T16:11:09Zby Lee, Chee Voon<br/>Author Lee, Chee Voon<br/>Format: Books<br/>Call Number HF5548.32 L43 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Global network security : threats and countermeasuresent://SD_ILS/0/SD_ILS:1363852024-04-24T16:11:09Z2024-04-24T16:11:09Zby Cameron, Debra<br/>Author Cameron, Debra<br/>Format: Books<br/>Call Number HD30.38 C35 2000<br/>Publisher Computer Technology Research,<br/>Publication Date 2000<br/>ISBN 9781566070775<br/>Using SET for secure electronic commerceent://SD_ILS/0/SD_ILS:1220032024-04-24T16:11:09Z2024-04-24T16:11:09Zby Drew, Grady N.<br/>Author Drew, Grady N.<br/>Format: Books<br/>Call Number HF5548.32 D74 1999<br/>Publisher Prentice Hall,<br/>Publication Date 1999<br/>ISBN 9780130997159<br/>E-commerce security strategies : protecting the enterpriseent://SD_ILS/0/SD_ILS:1363562024-04-24T16:11:09Z2024-04-24T16:11:09Zby Cameron, Debra<br/>Author Cameron, Debra<br/>Format: Books<br/>Call Number HF5548.32 C353 1998 f<br/>Publisher Computer Technology Research,<br/>Publication Date 1998<br/>ISBN 9781566070577<br/>E-commerce security : weak links, best defensesent://SD_ILS/0/SD_ILS:1143542024-04-24T16:11:09Z2024-04-24T16:11:09Zby Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G56 1998<br/>Publisher John Wiley,<br/>Publication Date 1998<br/>ISBN 9780471192237<br/>Intranet firewalls : planning & implementing your network security systement://SD_ILS/0/SD_ILS:4568362024-04-24T16:11:09Z2024-04-24T16:11:09Zby Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>Electronic selling : twenty-three steps to e-selling profitsent://SD_ILS/0/SD_ILS:4677902024-04-24T16:11:09Z2024-04-24T16:11:09Zby Jamison, Brian<br/>Author Jamison, Brian, Gold, Josh, Jamison, Warren<br/>Format: Books<br/>Call Number HF5548.325.U6 J35 1997<br/>Publisher McGraw-Hill,<br/>Publication Date 1997<br/>ISBN 9780070329300<br/>Internet security for businessent://SD_ILS/0/SD_ILS:1123762024-04-24T16:11:09Z2024-04-24T16:11:09Zby Bernstein, Terry<br/>Author Bernstein, Terry<br/>Format: Books<br/>Call Number HD30.38 I57 1996<br/>Publisher John Wiley,<br/>Publication Date 1996<br/>ISBN 9780471137528<br/>Frameworks of IT prosumption for business developmentent://SD_ILS/0/SD_ILS:8411922024-04-24T16:11:09Z2024-04-24T16:11:09Zby Pańkowska, Małgorzata editor<br/>Author Pańkowska, Małgorzata editor<br/>Format: Books<br/>Call Number HD45 F734 2014 f<br/>ISBN 9781466643130 9781466643147 9781466643154<br/>Cyber security management : a governance, risk and compliance frameworkent://SD_ILS/0/SD_ILS:8412952024-04-24T16:11:09Z2024-04-24T16:11:09Zby Trim, Peter R. J author<br/>Author Trim, Peter R. J author, Lee, Yang-Im author<br/>Format: Books<br/>Call Number HF5548.37 T754 2014<br/>ISBN 9781472432094 9781472432100 9781472432117<br/>A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANYent://SD_ILS/0/SD_ILS:8712832024-04-24T16:11:09Z2024-04-24T16:11:09Zby Hairunnazri Haron, 1985-, author<br/>Author Hairunnazri Haron, 1985-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H35 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANYent://SD_ILS/0/SD_ILS:8721272024-04-24T16:11:09Z2024-04-24T16:11:09Zby Hairunnazri Haron, 1985-, author<br/>Author Hairunnazri Haron, 1985-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064087 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>