Your search returned 68 results.

Sort
Results
1.
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: United States : New York, 2015
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 E58 2015.

2.
Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham, MA : Syngress, 2011
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (2)Call number: TK5105.885.G66 .H66 2011, ...

3.
Tom Clancy's net force springboard / created by Tom Clancy and Steve Pieczenik ; written by Steve Perry and Larry Segriff by Series: Tom Clancy's Net Force | Tom Clancy's Net Force
Material type: Text Text; Format: print ; Literary form: Fiction ; Audience: General;
Language: English
Publication details: London : Penguin, 2005
Other title:
  • Net force
  • Springboard
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: PS3553L245 T6563 2004.

4.
Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography / Roger Dube by
Material type: Text Text; Format: print
Publication details: Hoboken, NJ : John Wiley, 2008
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .D82 2008.

5.
IT security metrics : a practical framework for measuring security and protecting data / Lance Hayden by
Material type: Text Text; Format: print
Publication details: New York : McGraw Hill, 2010
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .H35 2010.

6.
Computer forensics jumpstart / Michael Solomon ... [et. al] by
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indiana : John Wiley, 2011
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .C69 2011.

7.
Handbook of electronic security and digital forensics / edited by Hamid Jahankhani ... [and others]. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Hackensack, NJ : World Scientific, 2010
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .H37 2010.

8.
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina and Curtis W. Rose, technical editor. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Waltham, MA : Syngress, 2012
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.76.C68 .M34 2012.

9.
Defending your digital assets : against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan and Julie J. C. H. Ryan. by
Material type: Text Text; Format: print
Publisher: New York : McGraw-Hill, 2000
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9 .N52 2000.

10.
Guide to computer forensics and investigation / Bill Nelson ... [and others].
Material type: Text Text; Format: print
Publisher: New York : Course Technology, 2004
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .G84 2004.

11.
Hacker's challenge 3 : 20 brand-new forensic scenarios and solutions / David Pollino ... [and others]. by
Material type: Text Text; Format: print
Publisher: New York : McGraw-Hill, 2006
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .H32 2006.

12.
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin. by Series:
Material type: Text Text; Format: print
Publisher: Upper Saddle River, NJ : Pearson Education, 2007
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: QA76.9.A25 .V64 2007.

13.
Insider computer fraud : an indepth framework for detecting and defending against insider IT attacks / Kenneth C. Brancik. by
Material type: Text Text; Format: print
Publisher: Boca Raton : Taylor and Francis, 2008
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (2)Call number: QA76.9.A25 .B73 2008, ...

14.
Computer hacking / Peggy J. Parks. by Series:
Material type: Text Text; Format: print
Publisher: Farmington Hills, MI : Lucent Books, 2008
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .P37 2008.

15.
Cyber crime / book editor, Louise I. Gerdes. by Series:
Material type: Text Text; Format: print
Publisher: Detroit : Greenhaven, 2009
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .C94 2009.

16.
Understanding and managing cybercrime / Samuel C. McQuade. by
Material type: Text Text; Format: print
Publisher: Boston, MA : Pearson, 2006
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .M68 2006.

17.
Digital crime and forensic science in cyberspace / Panagiotis Kanellis. by
Material type: Text Text; Format: print
Publisher: Hershey PA : Idea Group, 2006
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV6773 .K36 2006.

18.
Windows forensics : the field guide for conducting corporate computer investigations / Chad Steel. by
Material type: Text Text; Format: print
Publisher: Indianapolis, IN : John Wiley, 2006
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV8079.C65 .S73 2006.

19.
Computer forensics : an essential guide for accountants, lawyers and managers / Michael Sheetz. by
Material type: Text Text; Format: print
Publisher: Hoboken, NJ : John Wiley, 2007
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: HV8079.C65 .S53 2007.

20.
Spies among us : how to stop the spies, terrorists, hackers and criminals you don't even know you encounter every day / Ira Winkler. by
Material type: Text Text; Format: print
Publisher: Indianapolis, IN : John Wiley, 2005
Availability: Items available for loan: PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH (1)Call number: UB250 .W56 2005.

Pages

Powered by Koha