Kesedaran keselamatan siber
| Other Authors: | Kok, Ven Jyn, Masnizah Mohd, Wan Fariza Paizi@Fauzi |
|---|---|
| Format: | Book |
| Published: |
Selangor :
Universiti Kebangsaan Malaysia (UKM) ,
2019
|
| Subjects: |
Similar Items
88 privacy breaches to beware of : practical data protection tips from real-life experiences
by: Shepherdenson, Kevin
Published: (2016)
by: Shepherdenson, Kevin
Published: (2016)
IT auditing : using controls to protect information assets
by: Davis, Chris
Published: (2007)
by: Davis, Chris
Published: (2007)
Fundamentals of computer security technology
by: Amoroso, Edward G.
Published: (1994)
by: Amoroso, Edward G.
Published: (1994)
Cryptography and network security
by: Bagad, V.S
by: Bagad, V.S
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi
by: Nik Fauzi
Hacker 5 : pakar keselamatan rangkaian - norton internet security
Published: (2005)
Published: (2005)
Teknik menggempur virus
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
by: Muhammad Haiqal Mohd Jamaluddin
Published: (2009)
Instrusion alert : an ethical hacking guide to intrusion detection
by: Fadia, Ankit
Published: (2007)
by: Fadia, Ankit
Published: (2007)
Customer data platforms : use people data to transform the future of marketing engagement
by: Kihn,Martin
Published: (2021)
by: Kihn,Martin
Published: (2021)
Network security 1 and 2 companion guide
by: Rufi, Antoon W.
Published: (2007)
by: Rufi, Antoon W.
Published: (2007)
Network security technologies and solutions
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
by: Bhaiji, Fahim Hussain Yusuf
Published: (2008)
Network security : the complete reference
by: Bragg, Roberta
Published: (2005)
by: Bragg, Roberta
Published: (2005)
End-to-end network security : defense-in-depth
by: Santos, Omar
Published: (2008)
by: Santos, Omar
Published: (2008)
Analysis and design of algorithm
by: Dwivedi, Gyanendra Kumar
Published: (2007)
by: Dwivedi, Gyanendra Kumar
Published: (2007)
An introduction to dynamic data structures
by: Wilson,Raymond
Published: (1988)
by: Wilson,Raymond
Published: (1988)
Hacker 5 : Menyingkap Rahsia Windows
Published: (2005)
Published: (2005)
Data structures, algorithms, and software principles in C
by: Standish, Thomas A
Published: (1995)
by: Standish, Thomas A
Published: (1995)
Cryptography & network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Build your own security lab : a field guide for network testing
by: Gregg, Micheal (Micheal C.)
Published: (2008)
by: Gregg, Micheal (Micheal C.)
Published: (2008)
Data Communication and Computer Networks
by: Agrawal, Rajneesh
Published: (2007)
by: Agrawal, Rajneesh
Published: (2007)
AutoCAD 2008 : for engineers & designers
by: Tickoo, Sham
Published: (2008)
by: Tickoo, Sham
Published: (2008)
Web security & commerce
by: Garfinkel, Simson
Published: (1997)
by: Garfinkel, Simson
Published: (1997)
Winternals : defragmentation, recovery and administration field guide
Published: (2006)
Published: (2006)
An introduction to data communications and networking
by: Dinkar, Prof
Published: (2010)
by: Dinkar, Prof
Published: (2010)
Designing an IAM Framework with oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Visual quickstart guide : AppleWorks 6 for Macintosh
by: Hester, Nolan
Published: (2000)
by: Hester, Nolan
Published: (2000)
Menguasai perisian pembangunan halaman web : Microsoft FrontPage XP
by: Jamalludin Harun
Published: (2002)
by: Jamalludin Harun
Published: (2002)
Siri openOffice.org : calc : langkah demi langkah
by: Iskandar Ab Rashid
Published: (2003)
by: Iskandar Ab Rashid
Published: (2003)
Visual Basic.NET : pengenalan kepada bahasa pengaturcaraan
by: Jamalludin Harun
Published: (2003)
by: Jamalludin Harun
Published: (2003)
Memformat Laman Web XHTML menggunakan CSS
by: Iskandar Ab Rashid
Published: (2002)
by: Iskandar Ab Rashid
Published: (2002)
Menguasai sistem operasi Linux Redhat 9
by: Abdul Latiff bin Esa
Published: (2004)
by: Abdul Latiff bin Esa
Published: (2004)
Pengaturcaraan java : asas pembangunan sistem
by: Abd Rahman Ahmad
Published: (2006)
by: Abd Rahman Ahmad
Published: (2006)
Distributed Database systems : principles, algorithms and systems
by: Singh, Ikvinderpal
by: Singh, Ikvinderpal
Advanced data structures
by: Puntambekar A.A
Published: (2007)
by: Puntambekar A.A
Published: (2007)
Keselamatan rumah
by: Wood,Robert W.
Published: (1999)
by: Wood,Robert W.
Published: (1999)
Data modeling : a beginner's guide
by: Oppel, Andrew J.
Published: (2010)
by: Oppel, Andrew J.
Published: (2010)
Cybersecurity and third-party risk : third party threat hunting
by: Rasner C.,Gregory
Published: (2021)
by: Rasner C.,Gregory
Published: (2021)
Pendidikan alam sekitar : Melestarikan kesedaran masyarakat di Malaysia
Published: (2012)
Published: (2012)
Fundamentals of programming languages
Published: (2022)
Published: (2022)
Data mining techniques
by: Pujari, Arun K
Published: (2007)
by: Pujari, Arun K
Published: (2007)
Similar Items
-
88 privacy breaches to beware of : practical data protection tips from real-life experiences
by: Shepherdenson, Kevin
Published: (2016) -
IT auditing : using controls to protect information assets
by: Davis, Chris
Published: (2007) -
Fundamentals of computer security technology
by: Amoroso, Edward G.
Published: (1994) -
Cryptography and network security
by: Bagad, V.S -
Koleksi lengkap Software Hacking & teknik penghalang
by: Nik Fauzi