Your search returned 380 results.

Sort
Results
361.
Digital forensics for handheld devices / Eamon P. Doherty. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Boca Raton, FL : CRC Press, 2013
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV8079.C65 .D63 2013.

362.
Guide to network defense and countermeasures / Randy Weaver, Dawn Weaver, Dean Farwood;. by
Edition: 3rd Ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Clifton Park, NY : Course Technology, Cengage Learning, 2013
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .R36 2013.

363.
Risky business : protect your business from being stalked, conned, or blackmailed on the web / Daniel S Janal. by
Material type: Text Text; Format: print
Publisher: New York : John Wiley, 1998
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .J35 1998.

364.
Fighting computer crime : a new framework for protecting information / Donn B Parker. by
Material type: Text Text; Format: print
Publisher: New York : John Wiley, 1998
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .P37 1998.

365.
Hacking exposed j2ee and java : developing secure applications with java technology / Brian Buege, Randy Layman and Art Taylor. by
Material type: Text Text; Format: print
Publisher: New York : McGraw-Hill, [2002]Copyright date: ©2002
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5405.59 .B83 2002.

366.
Hacking exposed computer forensics / Chris Davis, Dave Cowen and Aaron Philipp. by
Material type: Text Text; Format: print
Publisher: New York : McGraw-Hill, 2005
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV8079.C65 .D38 2005.

367.
Cryptography and network security : principles and practices / William Stallings by
Edition: 2nd edition
Publisher: Upper Saddle River, N.J. : Prentice Hall, 1999Publisher: ©1999
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 S713 1999.

368.
RFID protocol design, optimization, and security for the Internet of things / Alex X. Liu, Muhammad Shahzad, Xiulong Liu and Keqiu Li. by Series: IET control, robotics and sensors series ; 112.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: London, United Kingdom : The Institution of Engineering and Technology, 2017Copyright date: ©2018
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (3)Call number: TK6570.I34 R4795 2017, ...

369.
Virtual shadows : your privacy in the information society / Karen Lawrence Oqvist. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Swindon : British Computer Society, 2009 ©2009
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HM851 .O68 2009.

370.
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh ... [and others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Indianapolis: Wiley, 2014Publisher: ©2014
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .A77 2014.

371.
Disaster management in telecommunications, broadcasting, and computer systems / Galal El Mahdy. by
Material type: Text Text; Format: print
Publisher: Chichester : New York : J. Wiley, 2001
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5102.5 .375 2001.

372.
Cisco router firewall security / Richard A. Deal. by Series:
Material type: Text Text; Format: print
Publisher: Indianapolis, IN : Cisco Press, 2005
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (2)Call number: TK5105.59 .D42 2005, ...

373.
The business case for network security / Catherine Paquet, Warren Saxe. by
Material type: Text Text; Format: print
Publisher: Indianapolis, IN : Cisco Press, 2005
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .P38 2005.

374.
Protocols for authentication and key establishment / Colin Boyd, Anish Mathuria. by Series: Information security and cryptography
Material type: Text Text; Format: print ; Literary form: Not fiction
Berlin : Springer, 2003Publisher: ©2003
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .B69 2003.

375.
Principles of computer security : security and beyond / William Arthur Conklin ... [and others]. by
Material type: Text Text; Format: print
Publisher: Boston, MA : McGraw-Hill, 2004
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .P74 2004.

376.
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience and ROI / Debra S. Herrmann. by
Material type: Text Text; Format: print
Publisher: Boca Raton, FL : Auerbach Publications, 2007
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5102.85 .H47 2007.

377.
Firewall policies and VPN configurations / edited by Anne Henmi ... [and others]. by
Material type: Text Text; Format: print
Publisher: London : Syngress Publishing, 2006
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .F58 2006.

378.
How to cheat at securing your network / [technical editor Ido Dubrawsky]. by Series:
Material type: Text Text; Format: print
Publisher: Burlington, MA : Syngress, 2007
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: TK5105.59 .H69 2007.

379.
Cyber terrorism : policy and technical perspective / Shahrin Sahib, Rabiah Ahmad, Zahri Yunos. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Durian Tunggal, Melaka : Penerbit Universiti, Universiti Teknikal Malaysia Melaka, [2015]Copyright date: ©2015
Online resources:
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773.15.C97.S45 HV6773.15.C97 S45 2015.

380.
CompTIA® Security+™ Deluxe: Study Guide / Emmett Dulaney. by
Edition: Fifth Edition
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Indiana: Wiley Publishing, Inc., 2011Publisher: c2011
Other title:
  • CompTIA security plus deluxe study guide
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.3 .D82279 2009.

Pages

Powered by Koha