Logo Politeknik Seberang Perai
1. Book Security in computing

by Pfleeger, Charles P.,1948-.

Edition: 2nd.ed. Publisher: New Jersey : Prentice-Hall,Inc., 1997Availability: Copies available for loan: [QA76.9.P45 1997 ] (5). Actions: Add to cart
2. Book Information technology security

by Siti Rahayu Selamat.

Publisher: Selangor : Prentice Hall, 2006Availability: Copies available for loan: [QA76.9 I53 2006 ] (3). Actions: Add to cart
3. Journal/Magazine Articles Cara lindungi telefon pintar

by Harun Khalid.

Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
4. Journal/Magazine Articles The hacked man

by Muller, Claudio.

Source: Chip MalaysiaAvailability: Journal/Magazine ArticlesQA75.565 C5 (1) Actions: Add to cart
No cover image available
5. Journal/Magazine Articles 10 cara kekal selamat di musim cuti

Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
6. Journal/Magazine Articles Effective and durable infrastructure

by Nair, Suresh.

Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43 (1) Actions: Add to cart
No cover image available
7. Journal/Magazine Articles Cara lindungi data excel

by Syafik Bakri.

Source: Majalah PCPublisher: Kuala Lumpur : Karangkraf, 2002Availability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
8. Journal/Magazine Articles The five big data lessons

by Ng, Tiang Beng.

Source: Malaysian BusinessPublisher: Kuala Lumpur : Berita Publishing, 2005-Availability: Journal/Magazine ArticlesHC445.5 M35 (1) Actions: Add to cart
No cover image available
9. Journal/Magazine Articles Lindungi data sektor kewangan

by Harun Khalid.

Source: Majalah PCPublisher: Kuala Lumpur, Karangkraf, 2002Availability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
Powered by Koha. Content copyrighted by Perpustakaan Politeknik Seberang Perai © 2023