Logo Politeknik Seberang Perai
1. Journal/Magazine Articles 10 cara kekal selamat di musim cuti

Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
2. Book with CD How to break software security: effective techniques for security testing

by Whittaker, James A; Thompson, Herbert.

Publisher: USA : Pearson Education, Inc., 2004Availability: Copies available for loan: [QA76.9 W48 2003 ] (1). Copies available for reference: [QA76.9 W48 2003] (1 ).
Actions: Add to cart
3. Book with CD Microsoft windows security resources kit

by Smith, Ben; Komar, Brian.

Edition: 2nd ed. Publisher: Redmond, Washington : Microsoft Press, 2005Availability: Copies available for loan: [QA76.9 S63 2005 ] (3). Copies available for reference: [QA76.9 S63 2005 ] (3 ).
Actions: Add to cart
4. Book with CD Teknik menggempur virus

by Muhammad Haiqal Mohd Jamaluddin.

Publisher: Batu Caves, Selangor : Venton, 2009Availability: Copies available for loan: [QA76.76.C68 M952 2009] (11). Actions: Add to cart
5. Book Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem

by Walker, Andy (Andy G.).

Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1). Actions: Add to cart
6. Book Network security essentials : applications and standards

by Stallings, William.

Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions: Add to cart
7. Journal/Magazine Articles A hacker-proof : operating systems

by Geiger, Jorg.

Source: Chip MalaysiaAvailability: Journal/Magazine ArticlesQA75.5 .C5 (1) Actions: Add to cart
No cover image available
8. Journal/Magazine Articles Simplifying branch office security

by Hodge, Benjamin.

Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43 (1) Actions: Add to cart
No cover image available
9. Journal/Magazine Articles Effective and durable infrastructure

by Nair, Suresh.

Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43 (1) Actions: Add to cart
No cover image available
10. Journal/Magazine Articles Cara pilih antivirus berkesan

by Syafiq Bakri.

Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233 (1) Actions: Add to cart
No cover image available
11. Journal/Magazine Articles Social media security : where do you end up sharing the least with strangers

by Magnus.

Source: PC.comPublisher: Petaling Jaya : Twenty First Century, 2000Availability: Journal/Magazine ArticlesQA76.8 I126P43 (1) Actions: Add to cart
No cover image available
12. Journal/Magazine Articles Which mobile device is the secure?

by Bansal, Sumit.

Source: PC.comPublisher: Petaling Jaya : Twenty First Century, 2000Availability: Journal/Magazine ArticlesQA76.8 I126.P43 (1) Actions: Add to cart
No cover image available
13. Book Cloud Computing: A Complete Guide on the Concepts and Design Of Cloud Computing (SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More)

by Hoffman, Jason.

Edition: Kindle EditionPublisher: US Amazon Digital Services LLC 2020Availability: Copies available for loan: [TK5105.88813. H644 2020] (1). Actions: Add to cart
No cover image available
14. Book Windows NT Security : A Practical Guide to Securing Windows NT Servers and Workstations

by Rutstein, Charles B.

Availability: Copies available for loan: [QA76.76 .O63R895 1997] (2). Actions: Add to cart
15. Book Principles of information security

by Whitman, Michael E; Mattord, Herbert J.

Edition: Fifth editionAvailability: Copies available for loan: [TK5105.59 .W54 2016] (1). Actions: Add to cart
16. Book APPLIED INFORMATION SECURITY : A Hands-On Guide to Information Security Software

by Boyle, Randall.

Edition: 1st ed.Availability: Copies available for reference: [QA76.9.A25 .B792 2010] (1 ). Actions: Add to cart
17. Book Security intelligence : a practitioner's guide to solving enterprise security challenges

by Li, Qing; Clark, Gregory.

Availability: Copies available for reference: [TK5105.59 .L52 2015] (1 ). Actions: Add to cart
18. Book The network security test lab : a step by step guide

by Gregg, Michael.

Availability: Copies available for reference: [TK5105.59 .G819 2015] (1 ). Actions: Add to cart
19. Book The antivirus hacker's handbook

by Koret, Joxean; Bachaalany, Elias.

Availability: Copies available for reference: [QA76.76.C68 .K67 2015] (1 ). Actions: Add to cart
20. Book SECURITY AND CONTROL IN INFORMATION SYSTEMS : A guide for business and accounting

by HAWKER, ANDREW.

Availability: Copies available for loan: [HF 5548.35 .HAW 2000] (1). Actions: Add to cart
Powered by Koha. Content copyrighted by Perpustakaan Politeknik Seberang Perai © 2023