Search Results for Computer crimes -- PreventionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bcrimes$002b--$002bPrevention$0026ps$003d300?dt=list2024-03-29T01:03:30ZEmerging trends in ICT securityent://SD_ILS/0/SD_ILS:8310312024-03-29T01:03:30Z2024-03-29T01:03:30Zby Akhgar, Babak, editor<br/>Author Akhgar, Babak, editor, Arabnia, Hamid R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 E46 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124114746<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:8380732024-03-29T01:03:30Z2024-03-29T01:03:30Zby Messier, Ric, author<br/>Author Messier, Ric, author, Konar, Allan, editor<br/>Format: Books<br/>Call Number QA76.9.A25 M475 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124170407<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:8380792024-03-29T01:03:30Z2024-03-29T01:03:30Zby Sood, Aditya K., author<br/>Author Sood, Aditya K., author, Enbody, Richard J.<br/>Format: Books<br/>Call Number TK5105.59 S66 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780128006047<br/>The basics of web hacking : tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:8310352024-03-29T01:03:30Z2024-03-29T01:03:30Zby Pauli, Josh<br/>Author Pauli, Josh<br/>Format: Books<br/>Call Number TK5105.59 P39 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9780124166004<br/>Sailing safe in cyberspace : protect your identity and dataent://SD_ILS/0/SD_ILS:8314412024-03-29T01:03:30Z2024-03-29T01:03:30Zby Kaushik, Anjali<br/>Author Kaushik, Anjali<br/>Format: Books<br/>Call Number HV8079 .C65 K38 2013<br/>Publisher SAGE Publications,<br/>Publication Date 2013<br/>ISBN 9788132111221<br/>Web application defender's cookbook : battling hackers and protecting usersent://SD_ILS/0/SD_ILS:8065072024-03-29T01:03:30Z2024-03-29T01:03:30Zby Barnett, Ryan C.<br/>Author Barnett, Ryan C.<br/>Format: Books<br/>Call Number QA76.9.A25 B377 2013<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2013 2012<br/>ISBN 9781118362181<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:7979622024-03-29T01:03:30Z2024-03-29T01:03:30Zby Shema, Mike<br/>Author Shema, Mike<br/>Format: Books<br/>Call Number TK5105.59 S545 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499514<br/>The computer incident response planning handbook : executable plans for protecting information at riskent://SD_ILS/0/SD_ILS:8013832024-03-29T01:03:30Z2024-03-29T01:03:30Zby McCarthy, N. K.<br/>Author McCarthy, N. K.<br/>Format: Books<br/>Call Number QA76.9.D314 M364 2012<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071790390<br/>Cybersecurity : public sector threats and responsesent://SD_ILS/0/SD_ILS:8024152024-03-29T01:03:30Z2024-03-29T01:03:30Zby Andreasson, Kim J.<br/>Author Andreasson, Kim J.<br/>Format: Books<br/>Call Number TK5105.59 C927 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439846636<br/>Advanced persistent threat : understanding the danger and how to protect your organizationent://SD_ILS/0/SD_ILS:8038002024-03-29T01:03:30Z2024-03-29T01:03:30Zby Cole, Eric.<br/>Author Cole, Eric.<br/>Format: Books<br/>Call Number QA76.9 .A25 C59 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499491<br/>Cybercrime and espionage : an analysis of subversive multivector threatsent://SD_ILS/0/SD_ILS:7354142024-03-29T01:03:30Z2024-03-29T01:03:30Zby Gragido, Will<br/>Author Gragido, Will, Pirc, John, Rogers, Russ<br/>Format: Books<br/>Call Number HV6773 G73 2011<br/>Publisher Syngress ; Elsevier Science [distributor],<br/>Publication Date 2011<br/>ISBN 9781597496131<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:7555732024-03-29T01:03:30Z2024-03-29T01:03:30Zby Amoroso, Edward G.<br/>Author Amoroso, Edward G.<br/>Format: Books<br/>Call Number HV6773.2 A47 2011<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2011<br/>ISBN 9780123849175<br/>Managing the risk of fraud and misconduct : meeting the challenges of a global regulated, and digital environmentent://SD_ILS/0/SD_ILS:7821362024-03-29T01:03:30Z2024-03-29T01:03:30Zby Girgenti, Richard H.<br/>Author Girgenti, Richard H., Hedley, Timothy P.<br/>Format: Books<br/>Call Number HF5636 M36 2011<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071621298<br/>Frameworks for ICT policy : government, social and legal issuesent://SD_ILS/0/SD_ILS:6305072024-03-29T01:03:30Z2024-03-29T01:03:30Zby Adomi, Esharenana E.<br/>Author Adomi, Esharenana E.<br/>Format: Books<br/>Call Number HC59.72 .I55 F73 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781616920128 9781616920135<br/>IT security metrics : a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:6433662024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hayden, Lance<br/>Author Hayden, Lance<br/>Format: Books<br/>Call Number QA76.9.A25 H394 2010<br/>Publisher McGraw Hill,<br/>Publication Date 2010<br/>ISBN 9780071713405<br/>Improving corporate governance through ICT risk managementent://SD_ILS/0/SD_ILS:7317272024-03-29T01:03:30Z2024-03-29T01:03:30Zby Bekzat Kalkabay, 1984-<br/>Author Bekzat Kalkabay, 1984-, Harihodin Selamat, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 B454 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/>Improving corporate governance through ICT risk managementent://SD_ILS/0/SD_ILS:7317282024-03-29T01:03:30Z2024-03-29T01:03:30Zby Bekzat Kalkabay, 1984-<br/>Author Bekzat Kalkabay, 1984-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 023675 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-03-29T01:03:30Z2024-03-29T01:03:30Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:7588932024-03-29T01:03:30Z2024-03-29T01:03:30Zby Shema, Mike<br/>Author Shema, Mike, Ely, Adam<br/>Format: Books<br/>Call Number TK5105.59 S544 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495431<br/>Handbook of research on social and organizational liabilities in information securityent://SD_ILS/0/SD_ILS:6319252024-03-29T01:03:30Z2024-03-29T01:03:30Zby Gupta, Manish<br/>Author Gupta, Manish, Sharman, Raj.<br/>Format: Books<br/>Call Number QA76.9.A25 H365 2009 f<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605661322 9781605661339<br/>Cyber fraud : tactics, techniques and proceduresent://SD_ILS/0/SD_ILS:3747162024-03-29T01:03:30Z2024-03-29T01:03:30Zby Graham, James<br/>Author Graham, James, Howard, Rick<br/>Format: Books<br/>Call Number HV6773 C92 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420091274<br/>Handbook of research on information security and assuranceent://SD_ILS/0/SD_ILS:2933792024-03-29T01:03:30Z2024-03-29T01:03:30Zby Jatinder N. D. Gupta<br/>Author Jatinder N. D. Gupta, Gupta, Jatinder N. D.<br/>Format: Books<br/>Call Number TK5105.59 H353 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048550<br/>Managing the human factor in information security : how to win over staff and influence business managersent://SD_ILS/0/SD_ILS:2963932024-03-29T01:03:30Z2024-03-29T01:03:30Zby Lacey, David<br/>Author Lacey, David<br/>Format: Books<br/>Call Number HF5548.37 L33 2009<br/>Publisher John Wiley & Sons,<br/>Publication Date 2009<br/>ISBN 9780470721995<br/>Bullying beyond the schoolyard : preventing and responding to cyberbullyingent://SD_ILS/0/SD_ILS:3500282024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hinduja, Sameer<br/>Author Hinduja, Sameer, Patchin, Justin W., 1977-<br/>Format: Books<br/>Call Number LB3013.3 H56 2009<br/>Publisher Corwin Press,<br/>Publication Date 2009<br/>ISBN 9781412966887<br/>Your neighbor's secret life online : protecting families from Internet conmen, scammers and predatorsent://SD_ILS/0/SD_ILS:2102772024-03-29T01:03:30Z2024-03-29T01:03:30Zby Dean, Stephen<br/>Author Dean, Stephen<br/>Format: Books<br/>Call Number HV6773 D42 2008<br/>Edition 1st ed.<br/>Publisher New Horizon Press,<br/>Publication Date 2008<br/>ISBN 9780882822945<br/>The dotCrime manifesto : how to stop internet crimeent://SD_ILS/0/SD_ILS:2480382024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hallam-Baker, Phillip<br/>Author Hallam-Baker, Phillip<br/>Format: Books<br/>Call Number HV6773 H35 2008<br/>Publisher Addison-Wesley Professional,<br/>Publication Date 2008<br/>ISBN 9780321503589<br/>Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)ent://SD_ILS/0/SD_ILS:5861022024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hamidi Achin<br/>Author Hamidi Achin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017334 ra<br/>Publication Date 2008<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)ent://SD_ILS/0/SD_ILS:2911512024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hamidi Achin<br/>Author Hamidi Achin, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK6680 H35 2008 raf<br/>Publication Date 2008<br/><a href="http://eprints.utm.my/9559">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:1566522024-03-29T01:03:30Z2024-03-29T01:03:30Zby Herrmann, Debra S.<br/>Author Herrmann, Debra S.<br/>Format: Books<br/>Call Number TK5102.85 H474 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849354021<br/>Integrate appropriate approach for network security assessment in cyber warfare branchent://SD_ILS/0/SD_ILS:8401412024-03-29T01:03:30Z2024-03-29T01:03:30Zby Mohd Azmi Arifin, 1969- , author<br/>Author Mohd Azmi Arifin, 1969- , author, Shamsul Shahibuddin, supervisor, Noor Azurati Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M648 2007 raf<br/>Publication Date 2007<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Integrate appropriate approach for network security assessment in cyber warfare branchent://SD_ILS/0/SD_ILS:8401422024-03-29T01:03:30Z2024-03-29T01:03:30Zby Mohd Azmi Arifin, 1969- , author<br/>Author Mohd Azmi Arifin, 1969- , author, Shamsul Shahibuddin, supervisor, Noor Azurati Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034004 ra<br/>Publication Date 2007<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Syngress force emerging threat analysis : from mischief to maliciousent://SD_ILS/0/SD_ILS:1609052024-03-29T01:03:30Z2024-03-29T01:03:30Zby Maynor, David<br/>Author Maynor, David<br/>Format: Books<br/>Call Number QA76.9.A25 S96 2006<br/>Publisher Syngress Publishing,<br/>Publication Date 2006<br/>ISBN 9781597490566<br/>Net crimes & misdemeanors : outmaneuvering web spammers, stalkers, and con artistsent://SD_ILS/0/SD_ILS:1872622024-03-29T01:03:30Z2024-03-29T01:03:30Zby Hitchcock, J. A.<br/>Author Hitchcock, J. A., Page, Loraine, 1952-<br/>Format: Books<br/>Call Number HV6773 H57 2006<br/>Edition 2nd ed.<br/>Publisher Information Today,<br/>Publication Date 2006<br/>ISBN 9780910965729<br/>Understanding and managing cybercrimeent://SD_ILS/0/SD_ILS:4704862024-03-29T01:03:30Z2024-03-29T01:03:30Zby McQuade, Samuel C.<br/>Author McQuade, Samuel C.<br/>Format: Books<br/>Call Number HV6773 M39 2006<br/>Publisher Pearson/Allyn and Bacon,<br/>Publication Date 2006<br/>ISBN 9780205439737<br/>Cyber Terrorism: A Guide for Facility Managersent://SD_ILS/0/SD_ILS:4140132024-03-29T01:03:30Z2024-03-29T01:03:30Zby Gustin, Joseph F.<br/>Author Gustin, Joseph F.<br/>Format: Books<br/>Call Number HV6773 G87 2004<br/>Publisher Fairmont Press,<br/>Publication Date 2004<br/>ISBN 088173442 (hbk.)<br/>Investigative data mining for security and criminal detectionent://SD_ILS/0/SD_ILS:7568552024-03-29T01:03:30Z2024-03-29T01:03:30Zby Mena, Jesus<br/>Author Mena, Jesus<br/>Format: Books<br/>Call Number QA76.9.D343 M44 2003<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2003<br/>ISBN 9780750676137<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:3983752024-03-29T01:03:30Z2024-03-29T01:03:30Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R., Peltier, Justin, Blackley, John A.<br/>Format: Books<br/>Call Number TK5105.59 P44 2003<br/>Publisher Auerbach Publications,<br/>Publication Date 2003<br/>ISBN 9780849312700<br/>Users' guide to computer crime: its commission, detection & preventionent://SD_ILS/0/SD_ILS:2466502024-03-29T01:03:30Z2024-03-29T01:03:30Zby Leibholz, Stephen W.<br/>Author Leibholz, Stephen W., Wilson, Louis D.<br/>Format: Books<br/>Call Number HF5548.2 .L45<br/>Publisher Chilton Book Co,<br/>Publication Date 1974<br/>ISBN 9780801960956<br/>Cyber security management : a governance, risk and compliance frameworkent://SD_ILS/0/SD_ILS:8412952024-03-29T01:03:30Z2024-03-29T01:03:30Zby Trim, Peter R. J author<br/>Author Trim, Peter R. J author, Lee, Yang-Im author<br/>Format: Books<br/>Call Number HF5548.37 T754 2014<br/>ISBN 9781472432094 9781472432100 9781472432117<br/>PROPOSING GUIDELINES FOR PHISHING VICTIMIZE BASED ON HEURISTIC SYSTEMATIC MODELent://SD_ILS/0/SD_ILS:8627382024-03-29T01:03:30Z2024-03-29T01:03:30Zby Ting, Li Shan, author<br/>Author Ting, Li Shan, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HV6773 T56 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>PROPOSING GUIDELINES FOR PHISHING VICTIMIZE BASED ON HEURISTIC SYSTEMATIC MODELent://SD_ILS/0/SD_ILS:8628872024-03-29T01:03:30Z2024-03-29T01:03:30Zby Ting, Li Shan, author<br/>Author Ting, Li Shan, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035038 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>Cyber fraud : tactics, techniques and proceduresent://SD_ILS/0/SD_ILS:8872532024-03-29T01:03:30Z2024-03-29T01:03:30Zby Graham, James editor<br/>Author Graham, James editor, Howard, Rick editor<br/>Format: Books<br/>Call Number HV6773 C92 2019<br/>ISBN 9780367385743<br/>