|
|
1. |
|
10 cara kekal selamat di musim cutiSource: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
2. |
|
How to break software security: effective techniques for security testing
by Whittaker, James A;
Thompson, Herbert.
Publisher: USA : Pearson Education, Inc., 2004Availability: Copies available for loan: [QA76.9 W48 2003 ] (1). Copies available for reference: [QA76.9 W48 2003] (1 ).
Actions:
Add to cart (remove)
|
|
|
3. |
|
Microsoft windows security resources kit
by Smith, Ben;
Komar, Brian.
Edition: 2nd ed. Publisher: Redmond, Washington : Microsoft Press, 2005Availability: Copies available for loan: [QA76.9 S63 2005 ] (3). Copies available for reference: [QA76.9 S63 2005 ] (3 ).
Actions:
Add to cart (remove)
|
|
|
4. |
|
Teknik menggempur virus
by Muhammad Haiqal Mohd Jamaluddin.
Publisher: Batu Caves, Selangor : Venton, 2009Availability: Copies available for loan: [QA76.76.C68 M952 2009] (11).
Actions:
Add to cart (remove)
|
|
|
5. |
|
Windows lockdown! : your XP and Vista guide against hacks, attacks, and other Internet mayhem
by Walker, Andy (Andy G.).
Publisher: Indianapolis, Ind. : Que, c2009Online Access: Table of contents only Availability: Copies available for loan: [QA76.9.A25 W177 2009 ] (1). In transit (1).
Actions:
Add to cart (remove)
|
|
|
6. |
|
Network security essentials : applications and standards
by Stallings, William.
Publisher: Upper Saddle River, NJ : Prentice Hall, 1999Availability: Copies available for loan: [TK5105.59 .S725 1999] (4). Copies available for reference: [TK5105.59 .S725 1999] (1 ).
Actions:
Add to cart (remove)
|
|
|
7. |
|
A hacker-proof : operating systems
by Geiger, Jorg.
Source: Chip MalaysiaAvailability: Journal/Magazine ArticlesQA75.5 .C5
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
8. |
|
Simplifying branch office security
by Hodge, Benjamin.
Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
9. |
|
Effective and durable infrastructure
by Nair, Suresh.
Source: PC.comAvailability: Journal/Magazine ArticlesQA76.8 I126P43
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
10. |
|
Cara pilih antivirus berkesan
by Syafiq Bakri.
Source: Majalah PCAvailability: Journal/Magazine ArticlesQA76.M233
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
11. |
|
Social media security : where do you end up sharing the least with strangers
by Magnus.
Source: PC.comPublisher: Petaling Jaya : Twenty First Century, 2000Availability: Journal/Magazine ArticlesQA76.8 I126P43
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
12. |
|
Which mobile device is the secure?
by Bansal, Sumit.
Source: PC.comPublisher: Petaling Jaya : Twenty First Century, 2000Availability: Journal/Magazine ArticlesQA76.8 I126.P43
(1)
Actions:
Add to cart (remove)
|
No cover image available
|
|
13. |
|
Cloud Computing: A Complete Guide on the Concepts and Design Of Cloud Computing (SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More)
by Hoffman, Jason.
Edition: Kindle EditionPublisher: US Amazon Digital Services LLC 2020Availability: Copies available for loan: [TK5105.88813. H644 2020] (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
14. |
|
Windows NT Security : A Practical Guide to Securing Windows NT Servers and Workstations
by Rutstein, Charles B.
Availability: Copies available for loan: [QA76.76 .O63R895 1997] (2).
Actions:
Add to cart (remove)
|
|
|
15. |
|
Principles of information security
by Whitman, Michael E;
Mattord, Herbert J.
Edition: Fifth editionAvailability: Copies available for loan: [TK5105.59 .W54 2016] (1).
Actions:
Add to cart (remove)
|
|
|
16. |
|
APPLIED INFORMATION SECURITY : A Hands-On Guide to Information Security Software
by Boyle, Randall.
Edition: 1st ed.Availability: Copies available for reference: [QA76.9.A25 .B792 2010] (1 ).
Actions:
Add to cart (remove)
|
|
|
17. |
|
Security intelligence : a practitioner's guide to solving enterprise security challenges
by Li, Qing;
Clark, Gregory.
Availability: Copies available for reference: [TK5105.59 .L52 2015] (1 ).
Actions:
Add to cart (remove)
|
|
|
18. |
|
The network security test lab : a step by step guide
by Gregg, Michael.
Availability: Copies available for reference: [TK5105.59 .G819 2015] (1 ).
Actions:
Add to cart (remove)
|
|
|
19. |
|
The antivirus hacker's handbook
by Koret, Joxean;
Bachaalany, Elias.
Availability: Copies available for reference: [QA76.76.C68 .K67 2015] (1 ).
Actions:
Add to cart (remove)
|
|
|
20. |
|
SECURITY AND CONTROL IN INFORMATION SYSTEMS : A guide for business and accounting
by HAWKER, ANDREW.
Availability: Copies available for loan: [HF 5548.35 .HAW 2000] (1).
Actions:
Add to cart (remove)
|
|