Refine your search

Your search returned 623 results.

Sort
Results
221.
222.
Handbook of information security management Sumit K Tukral by
Publication details: Delhi : Authorspress, 1999
Availability: Items available for loan: PERPUSTAKAAN DR ABDUL LATIFF (1)Call number: QA76.9.T532 1999 9.

223.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions / [edited by] Chang-Tsun Li. by
Publication details: Hershey, PA : Information Science Reference, 2010
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV6773.H374 3.

224.
Handbook of research on digital crime, cyberspace security, and information assurance / Maria Manuela Cruz-Cunha, Irene Maria Portela (editors). by Publisher: Hershey, PA : Information Science Reference, 2015
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV6773.H375 3.

225.
226.
Handbook of research on social and organizational liabilities in information security / [edited by] Manish Gupta, Raj Sharman. by
Publication details: Hershey, PA : Information Science Reference, 2009
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25H288.

227.
A handbook on ICT set-up and security / Hatta Mohd Yusoff by
Publication details: Kuala Lumpur : Utusan Publications & Distributors, 2003
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25H37.

228.
Hands on ethical hacking and network defense / by Michael T. Simpson by
Publication details: United States : Thomson Course Technology, 2006
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25S56.

229.
Hardening Linux [electronic resource] / by James Turnbull. by
Publication details: Berkeley, CA : New York : Apress ; Distributed to the book trade in the United States by Springer-Verlag, 2005
In: Springer e-books
Online resources:
Availability: No items available.

230.
Hardening Windows [electronic resource] / by Jonathan Hassell. by
Edition: Second Edition.
Publication details: Berkeley, CA : Springer, 2006
In: Springer e-books
Online resources:
Availability: No items available.

231.
Heterogeneous ensembles based on a weighted majority voting strategy for intrusion detection systems / Abdulla Amin Abdulla Aburomman. by Producer: 2017
Dissertation note: Thesis (Ph.D.) - Universiti Kebangsaan Malaysia, 2017.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.A255 2017 3 tesis.

232.
Honeypots for Windows [electronic resource] / by Roger A. Grimes. by
Publication details: Berkeley, CA : New York : Apress ; Distributed to the book trade in the United States by Springer-Verlag, 2005
In: Springer e-books
Online resources:
Availability: No items available.

233.
Hop Integrity in the Internet [electronic resource] / by Chin-Tser Huang, Mohamed G. Gouda. by Series: Advances in Information Security ; 21
Publication details: Boston, MA : Springer Science+Business Media, Inc., 2006
In: Springer e-books
Online resources:
Availability: No items available.

234.
How to do everything with windows XP home networking / Dave Field, Andrew Brandt by
Publication details: New York: Mc Graw-Hill , 2004
Other title:
  • Windows XP home networking
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.75.F54.

235.
How to secure and audit Oracle 10g and 11g / Ron Ben Natan ; foreword by Pete Finnigan by
Publication details: Boca Raton, Fl. : CRC Press, 2009
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25B459.

236.
Human-computer interaction and cybersecurity handbook / edited by Abbas Moallem. by Publisher: Boca Raton, Florida : CRC Press, [2019]Copyright date: ©2019
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.H835 3.

237.
Hybrid bees algorithm for feature selection in network anomaly detection / Osama Ahmad Alomari. by
Publication details: 2012
Dissertation note: Thesis (M.A) - Universiti Kebangsaan Malaysia, 2012.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.A445 2012 3 tesis.

238.
I love the Internet, but I want my privacy, too! : simple steps anyone can take to enjoy the Net without worry / Chris Peterson. by
Publication details: Rocklin, CA : Prima Pub., 1998
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.875.I57P473.

239.
Implementing database security and auditing : a guide for DBAs , information security administrators and auditors / Ron Ben Natan by
Publication details: Burlington, MA : Elsevier Digital Press, 2005
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25B46.

240.
Improving anomaly NIDS alarms based on alarm classification approach / Qais Saif Qassim. by Producer: 2016
Dissertation note: Tesis (Ph.D.)- Universiti Kebangsaan Malaysia, 2016.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.Q347 2016 3 tesis.

Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library