|
|
1. |
|
Security in computing
by Pfleeger, Charles P.,1948-.
Edition: 2nd.ed. Publisher: New Jersey : Prentice-Hall,Inc., 1997Availability: Copies available for loan: [QA76.9.P45 1997 ] (5).
Actions:
Add to cart (remove)
|
|
|
2. |
|
Information technology security
by Siti Rahayu Selamat.
Publisher: Selangor : Prentice Hall, 2006Availability: Copies available for loan: [QA76.9 I53 2006 ] (3).
Actions:
Add to cart (remove)
|
|
|
3. |
|
Cara lindungi telefon pintar
by Harun Khalid.
Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
4. |
|
The hacked man
by Muller, Claudio.
Source: Chip MalaysiaAvailability: Journal/Magazine ArticlesQA75.565 C5
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
5. |
|
10 cara kekal selamat di musim cutiSource: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
6. |
|
Effective and durable infrastructure
by Nair, Suresh.
Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
7. |
|
Cara lindungi data excel
by Syafik Bakri.
Source: Majalah PCPublisher: Kuala Lumpur : Karangkraf, 2002Availability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
8. |
|
The five big data lessons
by Ng, Tiang Beng.
Source: Malaysian BusinessPublisher: Kuala Lumpur : Berita Publishing, 2005-Availability: Journal/Magazine ArticlesHC445.5 M35
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
9. |
|
Lindungi data sektor kewangan
by Harun Khalid.
Source: Majalah PCPublisher: Kuala Lumpur, Karangkraf, 2002Availability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|