89 results Skip to content
Advanced
Advanced
  • Search: "Computer security"
Suggested Topics... within your search.
Computer security 78 Computer networks 32 Security measures 25
Data protection 14 Computers 11 Information technology 7
more ...
security measures 7 Access control 4 Computer crimes 4
Internet 4 Coding theory 3 Computer Security 3
Computer hackers 3 Computer viruses 3 Electronic data processing 3
Electronic data processing departments 3 Handbooks, manuals, etc 3 Java (Computer program language) 3
Linux 3 Application software 2 Auditing 2
Case studies 2 Computer 2 Computer architecture 2
Computer security - Law and legislation 2 Computers and civilization 2 Data encryption (Computer science) 2
Data processing 2 Development 2 Electronic commerce - Law and legislation 2
less ...
Showing 1 - 20 of 89 for search: '"Computer security"', query time: 0.18s
List  Grid  Visual 
1
Cover Image
CompTIA security+ exam guide, (Exam SY0-601)
by Conklin, Wm. Arthur
Published 2021
Subjects: '; “...Computer security Examinations Study guides...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
2
Cover Image
Fundamentals of information systems security
by Kim, David, (Information technology security consultant)
Published 2018
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
3
Cover Image
Mastering windows server 2012 R2
Published 2014
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
4
Cover Image
Guide to network defense and countermeasure
by Weaver, Randy
Published 2014
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
5
Cover Image
Information security fundamentals
by Peltier, Thomas R.
Published 2014
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
6
Cover Image
Network security essentials : applications and standards
by Stallings, William
Published 2014
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
7
Cover Image
Security for service oriented architectures
by Williams, Walter
Published 2014
Subjects: '; “...Computer security....”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
8
Cover Image
Security without obscurity : a guide to confidentiality, authentication, and integrity
by Stapleton, Jeffrey James
Published 2014
Subjects: '; “...Computer security....”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
9
Cover Image
Android Hacker's Handbook.
by Drake, Joshua J.
Published 2014
Subjects: '; “...Computer security....”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
10
Cover Image
Mastering windows server 2012 R2
Published 2014
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
11
Cover Image
Management of information security
by Whitman, Michael
Published 2013
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
12
Cover Image
Computer forensics and cyber crime : an introduction
by Britz, Marjie
Published 2013
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
13
Cover Image
Network security: a beginner's guide.
by Maiwald, Eric
Published 2013
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
14
Cover Image
Cyber security policy guidebook
Published 2012
Subjects: '; “...Computer security Government policy...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
15
Cover Image
Computer security : rinciples and practice
by Stallings, William
Published 2012
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
16
Cover Image
Engineering information security : the application of systems engineering concepts to achieve information assurance
by Jacobs, Stuart
Published 2011
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
17
Cover Image
IT audit, control, and security
by Moeller, Robert R.
Published 2010
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
18
Cover Image
Internet fraud casebook : the world wide web of deceit
Published 2010
Subjects: '; “...Computer security Case studies...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
19
Cover Image
Management of information security
by Whitman, Michael E.
Published 2010
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Open Shelf
Preview
Preview
Preview
20
Cover Image
Security software development : assessing and managing security risks
by Ashbaugh, Douglas A.
Published 2009
Subjects: '; “...Computer security...”
Call Number: Loading...
Located: Loading...
Preview
Preview
Preview
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next »
  • [5]
Search Tools: Get RSS Feed — Email this Search

Narrow Search

Institution
65 Kolej Professional MARA 13 Ibu Pejabat MARA 8 Kolej Kemahiran Tinggi MARA 3 Kolej MARA see all ...
Library
30 KPM Indera Mahkota 20 KPM Beranang 13 Perpustakaan MARA 11 KPM Seri Iskandar 4 MARA-Japan Industrial Institute 2 KKTM Kemaman more ... 2 KKTM Ledang 2 KM Banting 2 KPM Ayer Molek 2 KPM Bandar Melaka 1 KM Kulim see all ... less ...
Item Category
64 Open Shelf 3 Reference 2 Text Books see all ...
Collection
87 Book 2 AV Collection see all ...
Call Number
59 Q - Science 17 T - Technology 9 H - Social Science 4 K - Law see all ...
Author
3 Mattord, Herbert J. 3 Stallings, William 2 Kaufman, Charlie 2 Maiwald, Eric 2 Minasi, Mark 2 Perlman, Radia more ... 2 Rothke, Ben 2 Zaid Hamzah 1 Abu Bakar Munir 1 Abu bakar Munis 1 Anastasi, Joe 1 Anzaldua, Reynaldo 1 Ashbaugh, Douglas A. 1 Augastine, Paul T. 1 Bayuk, Jennifer L. 1 Breithaupt, Jim( 1955 -) 1 Britz, Marjie 1 CA 1 Calder, Alan 1 Chaganti, Venkata S. R. K. 1 Ciampa, Mark 1 Clark, Andrew 1 Cole, Eric 1 Conklin, Wm. Arthur 1 Conley, Jame W. 1 Conry-Murray, Andrew 1 Dalton, Curtis E. 1 Daswani, Neil 1 Davis, Chris 1 Desman, Mark B. see all ... less ...
Subject
78 Computer security 32 Computer networks 25 Security measures 14 Data protection 11 Computers 7 Information technology more ... 7 security measures 4 Access control 4 Computer crimes 4 Internet 3 Coding theory 3 Computer Security 3 Computer hackers 3 Computer viruses 3 Electronic data processing 3 Electronic data processing departments 3 Handbooks, manuals, etc 3 Java (Computer program language) 3 Linux 2 Application software 2 Auditing 2 Case studies 2 Computer 2 Computer architecture 2 Computer security - Law and legislation 2 Computers and civilization 2 Data encryption (Computer science) 2 Data processing 2 Development 2 Electronic commerce - Law and legislation see all ... less ...
Region
4 Malaysia 1 Malaysia - Security measures see all ...
Year of Publication

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • New Items

Need Help?

  • Search Tips
Loading...