Refine your search

Your search returned 623 results.

Sort
Results
21.
Applied cryptography : protocols, algorithms and source code in C / by Bruce Schneier. by
Edition: Second edition, 20th anniversary edition.
Publisher: Indianapolis : John Wiley &Sons, 2015Copyright date: ©2015
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.A25S35 2015 3.

22.
Architecting secure software systems / Asoke K. Talukder and Manish Chaitanya by
Publication details: Boca Raton : CRC Press/Taylor & Francis Group, 2008
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25T356.

23.
Artificial immune system : applications in computer security / Ying Tan. by Publisher: Hoboken : John Wiley & Sons Inc., 2016 In: Wiley e-books
Online resources:
Availability: No items available.

24.
Assessing and managing security risk in IT systems : a structured methodology / John McCumber by
Publication details: Boca Raton, FL : Auerbach Publications, 2005
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25.M3535.

25.
26.
27.
28.
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy / Patrick Engebretson ; technical editor, James Broad. by Series: Syngress the basics
Publication details: Waltham, MA : Syngress, c2011
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.E535 2.

29.
The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress. by
Publication details: Amsterdam : Syngress, c2011
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18.A535 2.

30.
31.
32.
Best damn firewall book period / technical editor : Anne Carasik-Henmi ; [contributors] : Thomas W. Shinder ... [et al.] by
Publication details: Rockland, Mass. : Syngress, 2003
Availability: Not available: PERPUSTAKAAN TUN SERI LANANG: Checked out (1).

33.
34.
Blockchain and smart contracts : design thinking and programming for FinTech / Lo Swee Won, Wang Yu [and] David Lee Kuo Chuen. by Publisher: Singapore : World Scientific Publishing Co. Pte. Ltd., 2021Copyright date: ©2021
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.B56.L679 3.

35.
Brute Force [electronic resource] : Cracking the Data Encryption Standard / by Matt Curtin. by
Publication details: New York, NY : Matt Curtin, 2005
In: Springer e-books
Online resources:
Availability: No items available.

36.
Building an effective information security policy architecture / Sandy Bacik by
Publication details: Boca Raton : CRC Press, c2008
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25B334.

37.
Building open source network security tools : components and techniques / Mike Schiffman by
Publication details: Indianapolis : Wiley Pub., 2003
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25S335.

38.
CEH v10 : certified ethical hacker study guide / Ric Messier. by
Publisher number:
  • EB00761690 Recorded Books
Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, [2019]Copyright date: ©2019
Other title:
  • CEH v10 certified ethical hacker study guide
Online resources:
Availability: No items available.

39.
40.
Chaos-based cryptography : theory, algorithms and application / Ljupco Kocarev and Shiguo Lian (Eds.) by Series: Studies in computational intelligence ; . 354
Publication details: Berlin : Springer, 2011
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25C428 3.

Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library