Your search returned 45 results.

Sort
Results
Industrials injuries and workmen's compensation in malaysia cases and materials Altaf Ahmad Mir ; foreword by : Ahmad Ibrahim by
  • Mir, Altaf Ahmad
  • Ahmad Ibrahim, Prof.Tan sri datuk
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Kuala Lumpur International Law Book Services 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: KD3229.K45 1997.

Database security Silvana Castano ... [et al.]. by
  • Castano, Silvana
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York, N.Y. Wokingham, England ; Reading, Mass. ACM Press ; Addison-Wesley c1995
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (3)Call number: QA76.9.D314 S55 1995, ...

Security investigations professional?s guide Larry G. Nicholson. by
  • Nicholson, Larry Gene, 1957-
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston Butterworth-Heinemann c2000
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: HV8093 .N53 1999.

Practical security training by Patrick Kane. by
  • Kane, Patrick 1966-
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA Butterworth Heinmann 2000
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: HV8290. K37 1999.

Java security Gary McGraw & Edward Felten by
  • McGraw, Gary
  • Felten, Edward
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76. 73.J38 M354 1997.

Software forensics Collecting evidence from the scene of a digital crime Robert M. Slade by
  • Slade, Robert M
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York McGraw-Hill 2004
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76.9.A25 S59 2004.

Computer security fundamentals Chuck Easttom by
  • Easttom, Chuck
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Upper Saddle River, N.J. Pearson Prentice Hall c2006
Availability: Not available: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN: Damaged (1).

Anti - hacker toolkit Mike shema ...[et.al.]
Edition: 3rd. ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York McGraw Hill/Osborne; 2006
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: TK5105.59 J65 2006.

Teknik menggempur virus Muhammad Haiqal Mohd Jamaluddin by
  • Muhammad Haiqal Mohd Jamaluddin [author]
Material type: Text Text; Format: print ; Literary form: Not fiction
Publisher: Selangor Venton Pub. 2009Copyright date: ©2009
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (5)Call number: QA76.76 .M84 2009, ...

Digital copyright protection/ Peter Wayner by
  • Wayner, Peter
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: London Academic Press 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76.9.A25W39 1997.

Risk analysis and the security survey James F. Broder. by
  • Broder, James F
Edition: 2nd ed.
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Boston, MA Butterworth Heinemann c2000
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: HV8290 .B72 2000.

Securing Java : getting down to business with mobile code Gary McGraw, Edward W. Felten by
  • McGraw, Gary
  • Felten, Edward
Edition: 2nd ed
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York : . Wiley Computer Pub. 1999
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76.73. J38 M354 1999.

Fighting computer crime : a new framework for protecting information Donn B. Parker by
  • Parker, Donn B
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley c1998
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (2)Call number: HV6773. P374 1998, ...

Protect your privacy on the Internet Bryan Pfaffenberger by
  • Pfaffenberger, Bryan
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley Computer Pub. 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (2)Call number: TK5105. 875.I57 P4835 1997, ...

UNIX system security tools Seth T. Ross. by
  • Ross, Seth T
Series: McGraw-Hill Unix series
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York McGraw-Hill 2000
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (5)Call number: QA76.9.A25 . R665 2000, ...

UNIX system security essentials Christoph Braun by
  • Braun, Christoph 1956-
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Wokingham, England ; Reading, Mass. Addison-Wesley c1995
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (2)Call number: QA76.76.O63 B735 1995, ...

Computer security Dieter Gollmann by
  • Gollmann, Dieter
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York John Wiley & Sons, Ltd. 1999
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (2)Call number: QA76.9.A25. G626 1999, ...

Windows NT server 4 security handbook Lee Hadfield, Dave Hatter, Dave Bixler. by
  • Hadfield, Lee
  • Bixler, Dave
  • Hatter, David, 1939-
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Indianapolis, IN Que Corp. 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76.9.A25. H33 1997.

UNIX system security tools Seth T. Ross ; foreword by Simon Garfinkel by
  • Ross, Seth T
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: Whitehouse Station McGraw-Hill 2000
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (1)Call number: QA76.9.A25 R826 1999.

Web security sourcebook Aviel D. Rubin, Daniel Greer, Marcus J. Ranum by
  • Rubin, Aviel D
  • Geer, Daniel
Material type: Text Text; Format: print ; Literary form: Not fiction
Publication details: New York Wiley Computer Pub. 1997
Availability: Items available for loan: PERPUSTAKAAN POLITEKNIK IBRAHIM SULTAN (2)Call number: TK5105. 59 .R83 1997, ...

Pages