Search Results for Computers -- Access control - Narrowed by: Computer networks -- Security measures -- Handbooks, manuals, etcSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bHandbooks$00252C$002bmanuals$00252C$002betc.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002b--$002bHandbooks$00252C$002bmanuals$00252C$002betc$0026ps$003d300?dt=list2024-04-20T12:20:43ZHandbook of research on information security and assuranceent://SD_ILS/0/SD_ILS:2933792024-04-20T12:20:43Z2024-04-20T12:20:43Zby Jatinder N. D. Gupta<br/>Author Jatinder N. D. Gupta, Gupta, Jatinder N. D.<br/>Format: Books<br/>Call Number TK5105.59 H353 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048550<br/>A handbook on ICT Set-up and securityent://SD_ILS/0/SD_ILS:3522082024-04-20T12:20:43Z2024-04-20T12:20:43Zby Hatta Mohd. Yusoff<br/>Author Hatta Mohd. Yusoff<br/>Format: Books<br/>Call Number QA76.9 H374 2003<br/>Publisher Utusan Pubs. & Distri.,<br/>Publication Date 2003<br/>ISBN 9789676114877<br/>