Search Results for Computer security - Narrowed by: Cyberspace -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Cyberspace$002b--$002bSecurity$002bmeasures$002509Cyberspace$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?dt=list2024-06-23T05:09:53ZCybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:8225492024-06-23T05:09:53Z2024-06-23T05:09:53Zby Mowbray, Thomas J.<br/>Author Mowbray, Thomas J.<br/>Format: Books<br/>Call Number QA76.9.A25 M69 2014<br/>Publisher John Wiley and Sons,<br/>Publication Date 2014 2013<br/>ISBN 9781118697115<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:8380792024-06-23T05:09:53Z2024-06-23T05:09:53Zby Sood, Aditya K., author<br/>Author Sood, Aditya K., author, Enbody, Richard J.<br/>Format: Books<br/>Call Number TK5105.59 S66 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780128006047<br/>Cyber security for educational leaders : a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:8300492024-06-23T05:09:53Z2024-06-23T05:09:53Zby Phillips, Richard A.<br/>Author Phillips, Richard A., Sianjina, Rayton R.<br/>Format: Books<br/>Call Number LB1028.3 P454 2013<br/>Publisher Routledge,<br/>Publication Date 2013<br/>ISBN 9780415631969 9780415631976<br/>Cyber attacks : protecting national infrastructureent://SD_ILS/0/SD_ILS:7555732024-06-23T05:09:53Z2024-06-23T05:09:53Zby Amoroso, Edward G.<br/>Author Amoroso, Edward G.<br/>Format: Books<br/>Call Number HV6773.2 A47 2011<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2011<br/>ISBN 9780123849175<br/>Cyber security, cyber crime and cyber forensics : applications and perspectivesent://SD_ILS/0/SD_ILS:7729772024-06-23T05:09:53Z2024-06-23T05:09:53Zby Santanam, Raghu, 1969-<br/>Author Santanam, Raghu, 1969-, Sethumadhavan, M., 1966-, Virendra, Mohit<br/>Format: Books<br/>Call Number QA76.9.A25 C93 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781609601232 9781609601256<br/>RIoT Control : Understanding and Managing Risks and the Internet of Thingsent://SD_ILS/0/SD_ILS:8668352024-06-23T05:09:53Z2024-06-23T05:09:53Zby Macaulay, Tyson<br/>Author Macaulay, Tyson<br/>Format: Books<br/>Call Number TK5105.59 M33 2017<br/>ISBN 9780124199712<br/>Cybersecurity and Privacy : Bridging the Gapent://SD_ILS/0/SD_ILS:8668462024-06-23T05:09:53Z2024-06-23T05:09:53Zby Khajuria, Samant<br/>Author Khajuria, Samant, Sørensen, Lene, Skouby, Knud Erik<br/>Format: Books<br/>Call Number TK5105.59 K43 2017<br/>ISBN 9788793519664<br/>