Search Results for Cyberspace -- Security measures. SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCyberspace$002b--$002bSecurity$002bmeasures.$0026ps$003d300?dt=list 2024-05-21T19:25:16Z Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:822549 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Mowbray, Thomas J.<br/>Author&#160;Mowbray, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M69 2014<br/>Publisher&#160;John Wiley and Sons,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781118697115<br/> Conflict and cooperation in cyberspace : the challenge to national security ent://SD_ILS/0/SD_ILS:835888 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Yannakogeorgos, Panayotis A editor<br/>Author&#160;Yannakogeorgos, Panayotis A editor,&#160;Lowther, Adam B editor<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;U163 C66 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466592018<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:838079 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Sood, Aditya K., author<br/>Author&#160;Sood, Aditya K., author,&#160;Enbody, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S66 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128006047<br/> Cyberspace and cybersecurity ent://SD_ILS/0/SD_ILS:805264 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Kostopoulos, George K.<br/>Author&#160;Kostopoulos, George K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C94 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466501331<br/> Cyber security for educational leaders : a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:830049 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Phillips, Richard A.<br/>Author&#160;Phillips, Richard A.,&#160;Sianjina, Rayton R.<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.3 P454 2013<br/>Publisher&#160;Routledge,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780415631969&#160;9780415631976<br/> Hacking miracles : the true strories of inventors and cyberspace pioneer such as Alexander Bell, Thomas Edison, Steve Jobs, Bill Gates and others ent://SD_ILS/0/SD_ILS:816673 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Gubitosa, Carlo<br/>Author&#160;Gubitosa, Carlo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 G83 2011<br/>Publisher&#160;Jaico Publishing House,<br/>Publication Date&#160;2011<br/>ISBN&#160;9788184952018<br/> Cyber attacks : protecting national infrastructure ent://SD_ILS/0/SD_ILS:755573 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Amoroso, Edward G.<br/>Author&#160;Amoroso, Edward G.<br/>Format:&#160;Books<br/>Call Number&#160;HV6773.2 A47 2011<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780123849175<br/> Cyber security, cyber crime and cyber forensics : applications and perspectives ent://SD_ILS/0/SD_ILS:772977 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Santanam, Raghu, 1969-<br/>Author&#160;Santanam, Raghu, 1969-,&#160;Sethumadhavan, M., 1966-,&#160;Virendra, Mohit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C93 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781609601232&#160;9781609601256<br/> Cyber security and global information assurance : threat analysis and response solutions ent://SD_ILS/0/SD_ILS:331444 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Knapp, Kenneth J.<br/>Author&#160;Knapp, Kenneth J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K535 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781605663265<br/> Protecting yourself online : the definitive resource on safety, freedom, and privacy in cyberspace ent://SD_ILS/0/SD_ILS:794299 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Gelman, Robert B.<br/>Author&#160;Gelman, Robert B.,&#160;McCandlish, Stanton<br/>Format:&#160;Books<br/>Call Number&#160;KF390.5.C6 G45 1998<br/>Publisher&#160;Harper Edge,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780062515124<br/> RIoT Control : Understanding and Managing Risks and the Internet of Things ent://SD_ILS/0/SD_ILS:866835 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Macaulay, Tyson<br/>Author&#160;Macaulay, Tyson<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M33 2017<br/>ISBN&#160;9780124199712<br/> Cybersecurity and Privacy : Bridging the Gap ent://SD_ILS/0/SD_ILS:866846 2024-05-21T19:25:16Z 2024-05-21T19:25:16Z by&#160;Khajuria, Samant<br/>Author&#160;Khajuria, Samant,&#160;S&oslash;rensen, Lene,&#160;Skouby, Knud Erik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2017<br/>ISBN&#160;9788793519664<br/>