Refine your search

Your search returned 623 results.

Sort
Results
41.
Check Point FireWall-1 : administration guide / Marcus Goncalves, Steven A. Brown by
Publication details: New York : McGraw-Hill, 2000
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: TK5105.59.G6497 3, ...

42.
43.
CISSP guide to security essentials / Peter Gregory. by
Publication details: Boston, MA : Course Technology, 2010
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25G744 3, ... PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25G744.

44.
A classical introduction to cryptography : applications for communications security / by Serge Vaudenay. by
Publication details: New York : Springer, 2005
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25V384.

45.
46.
47.
Cloud management and security / Imad M. Abbadi. by Publisher: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014 In: Wiley e-books
Online resources:
Availability: No items available.

48.
Cloud security : a comprehensive guide to secure cloud computing / Ronald L. Krutz, Russell Dean Vines. by
Publication details: Indianapolis, IN : Wiley Publishing, 2010
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.88813.K785.

49.
Cloud security : a general guide to secured computing / Masnida Hussin,Aziah Asmawi, Normalia Samian. by Copyright date: ©2021Publisher: Serdang, Selangor : Universiti Putra Malaysia Press, 2021
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.585 .M347 3.

50.
Communication in a wired world [videorecording] : be smart, be safe / video production, Stage Fright ; writer & executive producer, Louise Welsh Schrank by
Publication details: Chicago, Illinois : Learning Seed, 2009
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: dvd HM851 .C66.

51.
52.
53.
Compendium on information network security / Suruhanjaya Komunikasi dan Multimedia Malaysia by
Publication details: Cyberjaya : Malaysian Communications and Multimedia Commission, 2005
Online resources:
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: MK10 SKMM 20 C65.

54.
The complete guide to internet security / Mark S. Merkow and James Breithaupt by
Publication details: New York : American Management Association, 2000
Availability: Items available for loan: PERPUSTAKAAN DR ABDUL LATIFF (1)Call number: TK5105.875.I57M465 2000 9.

55.
Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI / Debra S. Herrmann by
Publication details: Boca Raton : Auerbach Publications, 2007
Online resources:
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5102.85.H465 3.

56.
57.
58.
59.
Computational performance of quadratic and cubic lucas based cryptosystems / Reza Naghizadeh Majid. by Producer: 2015
Dissertation note: Thesis (Ph.D.) - Universiti Kebangsaan Malaysia, 2015.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.A25M344 2015 3 tesis.

60.
Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library