Search Results for Computer security - Narrowed by: Reference BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253AREF_BK$002509Reference$002bBook$0026ic$003dtrue$0026ps$003d300?dt=list2024-06-20T07:25:43ZEncyclopaedia of cyber law and computer security : measures , controls & practicesent://SD_ILS/0/SD_ILS:8140482024-06-20T07:25:43Z2024-06-20T07:25:43Zby Moore, Paul., editor<br/>Author Moore, Paul., editor<br/>Format: Books<br/>Call Number TK7885.A2 E53 2012 re v.1<br/>Publisher Nyx Academics,<br/>Publication Date 2012<br/>ISBN 9781621580003<br/>Data & computer security : dictionary of standards, concepts and termsent://SD_ILS/0/SD_ILS:1909472024-06-20T07:25:43Z2024-06-20T07:25:43Zby Longley, Dennis<br/>Author Longley, Dennis, Shain, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 L67 1987 rd<br/>Publisher Stockton Pr,<br/>Publication Date 1987<br/>ISBN 9780333429358<br/>Information security management handbook Volume 7ent://SD_ILS/0/SD_ILS:8211412024-06-20T07:25:43Z2024-06-20T07:25:43Zby O'Hanley, Richard<br/>Author O'Hanley, Richard, Tiller, James S.<br/>Format: Books<br/>Call Number QA76.9.A25 I548 2014 r<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2014 2013<br/>ISBN 9781466567498<br/>Information security management handbook Volume 6ent://SD_ILS/0/SD_ILS:8211552024-06-20T07:25:43Z2024-06-20T07:25:43Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Nozaki, Micki Krause<br/>Format: Books<br/>Call Number QA76.9.A25 I546 2012 r<br/>Edition 6th ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2012<br/>ISBN 9781439893135<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:2846812024-06-20T07:25:43Z2024-06-20T07:25:43Zby Quigley, Marian<br/>Author Quigley, Marian<br/>Format: Books<br/>Call Number HM851 E52 2008<br/>Publisher Information Science Reference,<br/>Publication Date 2008<br/>ISBN 9781591409878<br/>Operation management system for security department of Universiti Teknologi Malaysia (OMS-UTMSD)ent://SD_ILS/0/SD_ILS:8357282024-06-20T07:25:43Z2024-06-20T07:25:43Zby Alfalet, Mohamed O. Ali, author<br/>Author Alfalet, Mohamed O. Ali, author, Mohd. Ridzuan Ahmad, supervisor, Mohd. Faizal Abd. Latib, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.76.D47 A44 2007 raf<br/>Publication Date 2007<br/>Thesis (Sarjana Sains ( Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2007<br/>Security in grid computing : study and design a new model of authentication schemeent://SD_ILS/0/SD_ILS:8407132024-06-20T07:25:43Z2024-06-20T07:25:43Zby Ramadan Salem A. Ghashut, 1966-, author<br/>Author Ramadan Salem A. Ghashut, 1966-, author, Zailani Mohamed Sidek, Saiful Adli Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.C58 R36 2007 raf<br/>Publication Date 2007<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Websters new world hacker dictionaryent://SD_ILS/0/SD_ILS:1017692024-06-20T07:25:43Z2024-06-20T07:25:43Zby Schell, Bernadette H. (Bernadette Hlubik), 1952-<br/>Author Schell, Bernadette H. (Bernadette Hlubik), 1952-, Martin, Clemens<br/>Format: Books<br/>Call Number QA76.9.A25 S334 2006<br/>Publisher Wiley Pub,<br/>Publication Date 2006<br/>ISBN 9780470047521<br/>Dictionary of information securityent://SD_ILS/0/SD_ILS:1609552024-06-20T07:25:43Z2024-06-20T07:25:43Zby Slade, Robert<br/>Author Slade, Robert<br/>Format: Books<br/>Call Number QA76.9.A25 S525 2006<br/>Publisher Syngress Publishing,<br/>Publication Date 2006<br/>ISBN 9781597491150<br/>Handbook of information securityent://SD_ILS/0/SD_ILS:6231602024-06-20T07:25:43Z2024-06-20T07:25:43Zby Bidgoli, Hossein<br/>Author Bidgoli, Hossein<br/>Format: Books<br/>Call Number TK5105.59 H364 2006 v.1<br/>Publisher John Wiley,<br/>Publication Date 2006<br/>ISBN 9780471648307 9780471648314 9780471648321 9780471222019<br/>The Malaysian public sector information security risk assessment methodology (MyRAM)ent://SD_ILS/0/SD_ILS:8294702024-06-20T07:25:43Z2024-06-20T07:25:43Zby Malaysia. Jabatan Perdana Menteri. Unit Pemodenan Tadbiran dan Perancangan Pengurusan<br/>Author Malaysia. Jabatan Perdana Menteri. Unit Pemodenan Tadbiran dan Perancangan Pengurusan<br/>Format: Books<br/>Call Number QA76.9.A25 M356 2005 wr<br/>Publisher MAMPU,<br/>Publication Date 2005<br/>ISBN 9789839827194<br/>Penggunaan agen mobil dalam capaian maklumat muzik dengan menggunakan teori set fuzzyent://SD_ILS/0/SD_ILS:4211142024-06-20T07:25:43Z2024-06-20T07:25:43Zby Lim, Sze Wei<br/>Author Lim, Sze Wei, Ummul Khair Ahmad, Fakulti Pendidikan<br/>Format: Books<br/>Call Number QA76.76.I58 L554 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Information security management handbookent://SD_ILS/0/SD_ILS:3131852024-06-20T07:25:43Z2024-06-20T07:25:43Zby Tipton, Harold F.<br/>Author Tipton, Harold F., Krause, Micki<br/>Format: Books<br/>Call Number QA76.9.A25 H36 2002<br/>Edition 4th ed (v.3).<br/>Publisher Auerbach Pubs. ,<br/>Publication Date 2002<br/>ISBN 9780849311277<br/>Applications of cryptography for the security of database and distributed database systemsent://SD_ILS/0/SD_ILS:1655152024-06-20T07:25:43Z2024-06-20T07:25:43Zby Hardjono, Thomas<br/>Author Hardjono, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 H38 1991<br/>Publisher Univ. of New South Wales,<br/>Publication Date 1991<br/>Thesis (PhD) - University of New South Wales, Australian Defence Force Academy, 1991<br/>Security in IBM systemsent://SD_ILS/0/SD_ILS:2506112024-06-20T07:25:43Z2024-06-20T07:25:43Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.8.I1015 M83 1990 rp<br/>Edition 1st ed.<br/>Publisher Computer Technology Research Corp.,<br/>Publication Date 1990<br/>ISBN 9780927695510<br/>Computes and Securityent://SD_ILS/0/SD_ILS:4855602024-06-20T07:25:43Z2024-06-20T07:25:43ZFormat: Books<br/>Publisher North-Holland Publishing<br/>