Search Results for Computer security - Narrowed by: Cyberspace -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures$002509Cyberspace$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?dt=list 2024-06-23T05:09:53Z Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:822549 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Mowbray, Thomas J.<br/>Author&#160;Mowbray, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M69 2014<br/>Publisher&#160;John Wiley and Sons,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781118697115<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:838079 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Sood, Aditya K., author<br/>Author&#160;Sood, Aditya K., author,&#160;Enbody, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S66 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128006047<br/> Cyber security for educational leaders : a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:830049 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Phillips, Richard A.<br/>Author&#160;Phillips, Richard A.,&#160;Sianjina, Rayton R.<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.3 P454 2013<br/>Publisher&#160;Routledge,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780415631969&#160;9780415631976<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:755573 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Amoroso, Edward G.<br/>Author&#160;Amoroso, Edward G.<br/>Format:&#160;Books<br/>Call Number&#160;HV6773.2 A47 2011<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780123849175<br/> Cyber security, cyber crime and cyber forensics : applications and perspectives ent://SD_ILS/0/SD_ILS:772977 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Santanam, Raghu, 1969-<br/>Author&#160;Santanam, Raghu, 1969-,&#160;Sethumadhavan, M., 1966-,&#160;Virendra, Mohit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C93 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781609601232&#160;9781609601256<br/> RIoT Control : Understanding and Managing Risks and the Internet of Things ent://SD_ILS/0/SD_ILS:866835 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Macaulay, Tyson<br/>Author&#160;Macaulay, Tyson<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M33 2017<br/>ISBN&#160;9780124199712<br/> Cybersecurity and Privacy : Bridging the Gap ent://SD_ILS/0/SD_ILS:866846 2024-06-23T05:09:53Z 2024-06-23T05:09:53Z by&#160;Khajuria, Samant<br/>Author&#160;Khajuria, Samant,&#160;S&oslash;rensen, Lene,&#160;Skouby, Knud Erik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2017<br/>ISBN&#160;9788793519664<br/>