Refine your search

Your search returned 218 results.

Sort
Results
21.
22.
A classification method for identifying confidential data to enhance efficiency of query processing over cloud / Hussein Ali Fadhil. by Producer: ©2017
Dissertation note: Tesis ( Sarjana Sains )- Universiti Kebangsaan Malaysia, 2017.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.F336 2017 3 tesis.

23.
Cloud performance and storage consumption enhancement using adaptive replacement and probabilistic content placement algorithms / Ahmed Salih Mahdi. by Producer: ©2016
Dissertation note: Thesis (Sarjana Sains Komputer) - Universiti Kebangsaan Malaysia, 2016.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.585.M336 2016 3 tesis.

24.
Cloud security : a general guide to secured computing / Masnida Hussin,Aziah Asmawi, Normalia Samian. by Copyright date: ©2021Publisher: Serdang, Selangor : Universiti Putra Malaysia Press, 2021
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.585 .M347 3.

25.
Codes, ciphers, and computers : an introduction to information security / Bruce Bosworth by
Publication details: Hasbrouck Heights, N.J. : Hayden Book, 1982
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (2)Call number: Z103.B58, ...

26.
27.
Competition law and regulation of technology markets / Kevin Coates. by
Publication details: Oxford : Oxford University Press, 2011
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C13.5KJE.C683 2.

28.
29.
Computer crime / edited by Indira Carr. by Series: International library of criminology, criminal justice and penology. Second series
Publication details: Farnham, Surrey, England : Ashgate Pub., c2009
Online resources:
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (2)Call number: C18KF.C775 2, ...

30.
Computer security lab manual / Vincent J. Nestler ... [et al.] by Series: Information assurance & security series
Publication details: Boston : McGraw-Hill/Irwin, 2006
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25C665.

31.
Computer security policy issues : from past toward the future / Willis H. Ware by Series: The Rand paper series ; P-7402Publisher: Santa Monica, California : Rand Corporation, .1987
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: RAND 7 P-7402 1987.

32.
Concise European IT law / edited by Alfred Bullesbach ... [et al.]. by Series: Concise IP
Edition: 2nd ed.
Publication details: Alphen aan den Rijn, The Netherlands : Kluwer Law International, c2010
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18KJE.C693 2010 2.

33.
Confidential information law in Malaysia : cases and commentary / Juriah Abdul Jalil. by Series: Intellectual property series (Sweet & Maxwell Asia)
Edition: [Rev. ed.]
Publication details: Petaling Jaya, Selangor, Malaysia : Sweet & Maxwell Asia, 2003
Availability: Items available for loan: PERPUSTAKAAN HOSPITAL CANSELOR TUANKU MUHRIZ (2)Call number: KPG2610.J911c 2003 9HUKM, ... PERPUSTAKAAN TUN SERI LANANG (1)Call number: KQB.J877 2003 kat. PERPUSTAKAAN UNDANG-UNDANG (6)Call number: C59KQB.J87 2, ...

34.
Construction of cyber security strategy framework for Afghanistan based on document analysis and experts opinion / Khosraw Salamzada. by Producer: 2014
Dissertation note: Thesis (Master of Information Technology)- Universiti Kebangsaan Malaysia, 2014.
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.S295 2014 3 tesis.

35.
Copyright and electronic commerce : legal aspects of electronic copyright management / editor P. Bernt Hugenholtz by
Publication details: The Hague : Kluwer Law International 2000
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C59.15.C66 2.

36.
Cornerstone on information law / Damien Welfare. by Publisher: London: Bloomsbury Professional, 2019Copyright date: 2019
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C59.11KD.W43 2019 2.

37.
Cryptographic and information security : approaches for images and videos / edited by S. Ramakrishnan. by Publisher: Boca Raton : CRCPress, Taylor & Francis Group, [2019]Copyright date: ©2019
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.A25C843 3.

38.
Crytography and data security / Dorothy Elizabeth Robling Denning by
Publication details: Reading, Mass. : Addison-Wesley, 1982
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25D46.

39.
Cyber law in Australia / Eugene Clark ... [et al.]. by
Publication details: Alphen aan den Rijn, The Netherlands : Kluwer Law International, c2010
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18KTA.C983 2.

40.
Cyber law in Sweden / Christine Kirchberger. by
Publication details: Alphen aan den Rijn, The Netherlands : Kluwer Law International, c2011
Availability: Items available for loan: PERPUSTAKAAN UNDANG-UNDANG (1)Call number: C18KLP.K546 2.

Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library