Refine your search

Your search returned 622 results.

Sort
Results
201.
202.
Googling security : how much does Google know about you? / Greg Conti by
Publication details: Upper Saddle River, NJ : Addison-Wesley, 2009
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: QA76.9.A25C735 3.

203.
Grid computing security / Anirban Chakrabarti by
Publication details: Berlin : Springer, 2007
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.C58C493.

204.
Grid Computing Security [electronic resource] / by Anirban Chakrabarti. by
Publication details: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2007
In: Springer e-books
Online resources:
Availability: No items available.

205.
Guide to computer forensics and investigations / by Bill Nelson ... [et al.] by
Edition: 3rd ed.
Publisher: Boston, Mass. : Course Technology, 2008
Other title:
  • Computer forensics and investigations
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (2)Call number: HV8079.C65G854 2008, ...

206.
Guide to computer forensics and investigations / Bill Nelson, Amelia Phillips, Chris Steuart. by
Edition: Sixth edition.
Publisher: Boston, MA : Cengage, [2019]Copyright date: ©2019
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: HV8079.C65 N45 2019 3.

207.
Guidelines for the security of information systems. by
Publication details: Paris : OECD, 1996
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: OECD 20 S573.

208.
Hack attack : what you need to know about hackers ; why it pays to be paranoid ; new defenses to protect your trade secrets ; redefining corporate hackers / Rita Goh by
Publication details: Kuala Lumpur : Awesome Books, 2002
Availability: Items available for loan: PERPUSTAKAAN HOSPITAL CANSELOR TUANKU MUHRIZ (1)Call number: QA76.9.A25R598h 2002.

209.
Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time / John Chirillo by
Publication details: New York : Wiley, 2001
Online resources:
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25C45 3 ruj, ...

210.
Hack attacks testing : how to conduct your own security audit / John Chirillo by
Publication details: New York : Wiley, 2003
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25C49 3, ...

211.
Hacker attack / Richard Mansfield by
Publication details: San Francisco : Sybex, 2000
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25M36 3, ...

212.
Hacker V : pakar keselamatan rangkaian Norton Internet Security / PC Man by
Publication details: Taiwan : Kings Information Co., Ltd., 2003
Other title:
  • Hacker 5
Availability: Items available for loan: PERPUSTAKAAN DR ABDUL LATIFF (1)Call number: TK5105.59.P348h 2003. PERPUSTAKAAN HOSPITAL CANSELOR TUANKU MUHRIZ (1)Call number: TK5105.59.P348h 2003.

213.
Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray, George Kurtz by
Publication details: Berkeley : Osborne/McGraw-Hill , 1999
Availability: Not available: PERPUSTAKAAN HOSPITAL CANSELOR TUANKU MUHRIZ: Checked out (1).

214.
Hacking exposed : web applications : web application security secrets and solutions / Joel Scambray, Vincent Liu, Caleb Sima. by
Edition: 3rd ed.
Publication details: San Francisco : McGraw-Hill Companies, 2010
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.S324 2010 pasca.

215.
Hacking exposed 6 : network security secrets & solutions / Stuart McClure, Joel Scambray, George Kurtz by
Publication details: New York : McGraw-Hill, 2009
Other title:
  • Hacking exposed 6 : network security secrets & solutions /
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.A25 M395 2009.

216.
Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz. by Publisher: New York : McGraw-Hill, 2012
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (1)Call number: TK5105.59.M394 3.

217.
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes. by Publisher: Indianapolis, IN : Wiley, 2017 In: Wiley e-books
Online resources:
Availability: No items available.

218.
HackNotes Windows security portable reference / Michael O'Dea by Series: HackNotes series
Publication details: New York : McGraw-Hill/Osborne, 2003
Availability: Items available for loan: PERPUSTAKAAN TUN SERI LANANG (1)Call number: QA76.9.A25O33.

219.
Halting the hacker : a practical guide to computer security / Donald L. Lipkin by
Publication details: Upper Saddle River, N. J. : Prentice-Hall, 1997
Availability: Items available for loan: PERPUSTAKAAN LINGKUNGAN KEDUA (2)Call number: QA76.9.A25P56 3, ...

220.
Pages

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library