Refine your search

Your search returned 623 results.

Sort
Results
121.
Cybercrimes : a multidisciplinary analysis / Sumit Ghosh, Elliot Turrini, editors. by
Publication details: Heidelberg : Springer, 2010
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.C984 2.

122.
Cyberpunk : outlaws and hackers on the computer frontier / Katie Hafner and John Markoff by
Publication details: New York : Touchstone Book, 1995
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25H34 1995.

123.
Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman. by Publisher: New York : Oxford University Press, 2014Copyright date: ©2014
Other title:
  • Cybersecurity and cyberwar.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25S56 3, ...

124.
The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum in cybersecurity / Dan Shoemaker, Anne Kohnke, Ken Sigler. by Series: Publisher: Boca Raton : CRC Press Taylor & Francis Group, [2020]Copyright date: ©2020
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.A25S536 3.

125.
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS / Tyson Macaulay and Bryan Singer. by Publisher: Boca Raton, FL : CRC Press, [2012]Copyright date: ©2012
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.M334 2.

126.
Cybersecurity for SCADA systems / William T. Shaw by
Publication details: Tulsa, Okla. : PennWell Corp., 2006
Online resources:
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TJ222.S533.

127.
Cybersecurity policies and strategies for cyberwarfare prevention / Jean-Loup Richet, editor. by Publisher: Hershey, PA : Information Science Reference, [2015]Copyright date: ©2015
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV6773.15.C97C928 3.

128.
Cybersecurity readiness : a holistic and high-performance approach / Dave Chatterjee. by Publisher: Los Angeles, CA : SAGE Publications, Inc., 2021
Online resources:
Availability: No items available.

129.
Cyberspace and cybersecurity / George K. Kostopoulos. by Publisher: Boca Raton, Fl. : CRC Press, [2013]Copyright date: ©2013
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.K645 2.

130.
131.
Data-driven block ciphers for fast telecommunication systems / Nikolai Moldovyan, Alexander A. Moldovyan. by
Publication details: Boca Raton, FL : Auerbach Publications, 2007
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25M658.

132.
Data mining and machine learning in cybersecurity / Sumeet Dua, Xian Du. by
Publication details: Boca Raton : Taylor & Francis, 2011
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.D863 2.

133.
Data privacy : encryption and information hiding / David Salomon by
Publication details: New York : Springer, 2003
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25S265.

134.
Data Warehousing and Data Mining Techniques for Cyber Security [electronic resource] / by Anoop Singhal. by Series: Advances in Information Security ; 31
Publication details: Boston, MA : Springer Science+Business Media, LLC, 2007
In: Springer e-books
Online resources:
Availability: No items available.

135.
Database and applications security : integrating information security and data management / Bhavani Thuraisingham. by
Publication details: Boca Raton, FL : Auerbach Publications, 2005
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.D314.T498 3.

136.
Dear hacker : letters to the editor of 2600 / Emmanuel Goldstein. by
Publication details: Indianapolis, IN : Wiley Pub., Inc., 2010
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25G639 pasca.

137.
Decidable bisimulation technique in the SPI-Calculus for cryptographic protocols / Hasan Moh'd Hasan Al-Refai by
Publication details: Bangi : Fakulti Teknologi dan Sains Maklumat, Universiti Kebangsaan Malaysia, 2005
Dissertation note: Thesis (Ph.D.) - Universiti Kebangsaan Malaysia, 2005
Availability: Items available for loan: ZZ (1)Call number: QA76.9.A25A478 2005 3 tesis.

138.
Decrypted Secrets [electronic resource] : Methods and Maxims of Cryptology / by Friedrich L. Bauer. by
Edition: Fourth, Revised and Extended Edition.
Publication details: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2007
In: Springer e-books
Online resources:
Availability: No items available.

139.
Defending your digital assets against hackers, crackers, spies and thieves / Randall K. Nichols, Daniel J. Ryan [and] Julie J.C.H. Ryan by
Publication details: New York : McGraw-Hill, 2000
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25N528.

140.
Defense and detection strategies against Internet worms / Jose Nazario. by Series: Artech House computer security series
Publication details: Boston, MA : Artech House, 2004
Availability: Items available for loan: ZZ (1)Call number: QA76.9.A25.N398 3.

Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library