Refine your search

Your search returned 624 results.

Sort
Results
221.
Halting the hacker : a practical guide to computer security / Donald L. Lipkin by
Publication details: Upper Saddle River, N. J. : Prentice-Hall, 1997
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25P56 3, ...

222.
223.
Handbook of information security management Sumit K Tukral by
Publication details: Delhi : Authorspress, 1999
Availability: Items available for loan: PERPUSTAKAAN DR ABDUL LATIFF (1)Call number: QA76.9.T532 1999 9.

224.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions / [edited by] Chang-Tsun Li. by
Publication details: Hershey, PA : Information Science Reference, 2010
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV6773.H374 3.

225.
Handbook of research on digital crime, cyberspace security, and information assurance / Maria Manuela Cruz-Cunha, Irene Maria Portela (editors). by Publisher: Hershey, PA : Information Science Reference, 2015
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV6773.H375 3.

226.
227.
Handbook of research on social and organizational liabilities in information security / [edited by] Manish Gupta, Raj Sharman. by
Publication details: Hershey, PA : Information Science Reference, 2009
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25H288.

228.
A handbook on ICT set-up and security / Hatta Mohd Yusoff by
Publication details: Kuala Lumpur : Utusan Publications & Distributors, 2003
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25H37.

229.
Hands on ethical hacking and network defense / by Michael T. Simpson by
Publication details: United States : Thomson Course Technology, 2006
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25S56.

230.
Hardening Linux [electronic resource] / by James Turnbull. by
Publication details: Berkeley, CA : New York : Apress ; Distributed to the book trade in the United States by Springer-Verlag, 2005
In: Springer e-books
Online resources:
Availability: No items available.

231.
Hardening Windows [electronic resource] / by Jonathan Hassell. by
Edition: Second Edition.
Publication details: Berkeley, CA : Springer, 2006
In: Springer e-books
Online resources:
Availability: No items available.

232.
Heterogeneous ensembles based on a weighted majority voting strategy for intrusion detection systems / Abdulla Amin Abdulla Aburomman. by Producer: 2017
Dissertation note: Thesis (Ph.D.) - Universiti Kebangsaan Malaysia, 2017.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.A255 2017 3 tesis.

233.
Honeypots for Windows [electronic resource] / by Roger A. Grimes. by
Publication details: Berkeley, CA : New York : Apress ; Distributed to the book trade in the United States by Springer-Verlag, 2005
In: Springer e-books
Online resources:
Availability: No items available.

234.
Hop Integrity in the Internet [electronic resource] / by Chin-Tser Huang, Mohamed G. Gouda. by Series: Advances in Information Security ; 21
Publication details: Boston, MA : Springer Science+Business Media, Inc., 2006
In: Springer e-books
Online resources:
Availability: No items available.

235.
How to do everything with windows XP home networking / Dave Field, Andrew Brandt by
Publication details: New York: Mc Graw-Hill , 2004
Other title:
  • Windows XP home networking
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.75.F54.

236.
How to secure and audit Oracle 10g and 11g / Ron Ben Natan ; foreword by Pete Finnigan by
Publication details: Boca Raton, Fl. : CRC Press, 2009
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25B459.

237.
Human-computer interaction and cybersecurity handbook / edited by Abbas Moallem. by Publisher: Boca Raton, Florida : CRC Press, [2019]Copyright date: ©2019
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.H835 3.

238.
Hybrid bees algorithm for feature selection in network anomaly detection / Osama Ahmad Alomari. by
Publication details: 2012
Dissertation note: Thesis (M.A) - Universiti Kebangsaan Malaysia, 2012.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.A445 2012 3 tesis.

239.
I love the Internet, but I want my privacy, too! : simple steps anyone can take to enjoy the Net without worry / Chris Peterson. by
Publication details: Rocklin, CA : Prima Pub., 1998
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.875.I57P473.

240.
Implementing database security and auditing : a guide for DBAs , information security administrators and auditors / Ron Ben Natan by
Publication details: Burlington, MA : Elsevier Digital Press, 2005
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25B46.

Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library