Search Results for Computer security - Narrowed by: Reference Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AREF_BK$002509Reference$002bBook$0026ic$003dtrue$0026ps$003d300?dt=list 2024-06-20T07:25:43Z Encyclopaedia of cyber law and computer security : measures , controls &amp; practices ent://SD_ILS/0/SD_ILS:814048 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Moore, Paul., editor<br/>Author&#160;Moore, Paul., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A2 E53 2012 re v.1<br/>Publisher&#160;Nyx Academics,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781621580003<br/> Data &amp; computer security : dictionary of standards, concepts and terms ent://SD_ILS/0/SD_ILS:190947 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Longley, Dennis<br/>Author&#160;Longley, Dennis,&#160;Shain, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L67 1987 rd<br/>Publisher&#160;Stockton Pr,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780333429358<br/> Information security management handbook Volume 7 ent://SD_ILS/0/SD_ILS:821141 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;O'Hanley, Richard<br/>Author&#160;O'Hanley, Richard,&#160;Tiller, James S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I548 2014 r<br/>Edition&#160;6th ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781466567498<br/> Information security management handbook Volume 6 ent://SD_ILS/0/SD_ILS:821155 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Tipton, Harold F.<br/>Author&#160;Tipton, Harold F.,&#160;Nozaki, Micki Krause<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I546 2012 r<br/>Edition&#160;6th ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439893135<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:284681 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Quigley, Marian<br/>Author&#160;Quigley, Marian<br/>Format:&#160;Books<br/>Call Number&#160;HM851 E52 2008<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781591409878<br/> Operation management system for security department of Universiti Teknologi Malaysia (OMS-UTMSD) ent://SD_ILS/0/SD_ILS:835728 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Alfalet, Mohamed O. Ali, author<br/>Author&#160;Alfalet, Mohamed O. Ali, author,&#160;Mohd. Ridzuan Ahmad, supervisor,&#160;Mohd. Faizal Abd. Latib, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 A44 2007 raf<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains ( Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2007<br/> Security in grid computing : study and design a new model of authentication scheme ent://SD_ILS/0/SD_ILS:840713 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Ramadan Salem A. Ghashut, 1966-, author<br/>Author&#160;Ramadan Salem A. Ghashut, 1966-, author,&#160;Zailani Mohamed Sidek,&#160;Saiful Adli Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.C58 R36 2007 raf<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> Websters new world hacker dictionary ent://SD_ILS/0/SD_ILS:101769 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Schell, Bernadette H. (Bernadette Hlubik), 1952-<br/>Author&#160;Schell, Bernadette H. (Bernadette Hlubik), 1952-,&#160;Martin, Clemens<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S334 2006<br/>Publisher&#160;Wiley Pub,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470047521<br/> Dictionary of information security ent://SD_ILS/0/SD_ILS:160955 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Slade, Robert<br/>Author&#160;Slade, Robert<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S525 2006<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781597491150<br/> Handbook of information security ent://SD_ILS/0/SD_ILS:623160 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Bidgoli, Hossein<br/>Author&#160;Bidgoli, Hossein<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H364 2006 v.1<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471648307&#160;9780471648314&#160;9780471648321&#160;9780471222019<br/> The Malaysian public sector information security risk assessment methodology (MyRAM) ent://SD_ILS/0/SD_ILS:829470 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Malaysia. Jabatan Perdana Menteri. Unit Pemodenan Tadbiran dan Perancangan Pengurusan<br/>Author&#160;Malaysia. Jabatan Perdana Menteri. Unit Pemodenan Tadbiran dan Perancangan Pengurusan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M356 2005 wr<br/>Publisher&#160;MAMPU,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789839827194<br/> Penggunaan agen mobil dalam capaian maklumat muzik dengan menggunakan teori set fuzzy ent://SD_ILS/0/SD_ILS:421114 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Lim, Sze Wei<br/>Author&#160;Lim, Sze Wei,&#160;Ummul Khair Ahmad,&#160;Fakulti Pendidikan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 L554 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:313185 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Tipton, Harold F.<br/>Author&#160;Tipton, Harold F.,&#160;Krause, Micki<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H36 2002<br/>Edition&#160;4th ed (v.3).<br/>Publisher&#160;Auerbach Pubs. ,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780849311277<br/> Applications of cryptography for the security of database and distributed database systems ent://SD_ILS/0/SD_ILS:165515 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Hardjono, Thomas<br/>Author&#160;Hardjono, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H38 1991<br/>Publisher&#160;Univ. of New South Wales,<br/>Publication Date&#160;1991<br/>Thesis (PhD) - University of New South Wales, Australian Defence Force Academy, 1991<br/> Security in IBM systems ent://SD_ILS/0/SD_ILS:250611 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.8.I1015 M83 1990 rp<br/>Edition&#160;1st ed.<br/>Publisher&#160;Computer Technology Research Corp.,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780927695510<br/> Computes and Security ent://SD_ILS/0/SD_ILS:485560 2024-06-20T07:25:43Z 2024-06-20T07:25:43Z Format:&#160;Books<br/>Publisher&#160;North-Holland Publishing<br/>