Your search returned 7 results.

Sort
Results
1.
Mastering windows server 2012 R2 Mark Minasi... [et al.] by
Material type: Text Text
Publication details: Indianapolis, IN John Wiley & Son c2014; Indianapolis, IN John Wiley & Son c2014
Availability: Items available for loan: KKTM Ledang (5). MJII (1).

2.
Engineering information security the application of systems engineering concepts to achieve information assurance Stuart Jacobs by
Material type: Text Text
Publication details: Hoboken,N.J. John Wiley & Sons c2011; Hoboken,N.J. John Wiley & Sons c2011
Availability: Items available for loan: MJII (2).

3.
Guide to network defense and countermeasure Ransy Weaver, Dawn Weaver, Dean Farwood by
Edition: 3rd ed
Material type: Text Text
Publication details: Boston, Mass. Course Technology c2014; Boston, Mass. Course Technology c2014
Availability: Items available for loan: MJII (1).

4.
Hacking exposed 7 network security secrets &solutions Stuart McClure, Joel Scambray, George Kurtz by
Material type: Text Text
Publication details: New York, NY The McGraw Hill Companies c1999; New York, NY The McGraw Hill Companies c1999
Availability: Items available for loan: MJII (1).

5.
Android Hacker's Handbook by
Material type: Text Text
Publication details: Indianapolis John Wiley & Sons 2014; Indianapolis John Wiley & Sons 2014
Availability: Items available for loan: KKTM Ledang (2).

6.
Fundamentals of information systems security David Kim Michael G. Solomon by
Material type: Text Text
Publisher: Burlington, MA Jones & Bartlett Learning [2018]
Availability: Items available for loan: KKTM Kemaman (1).

7.
Simple Steps to Data Encryption : a practical guide to secure computing / Peter Loshin. by
Amsterdam : Elsevier Science, 2013
Availability: Items available for loan: IKM Sik (2)Call number: QA76.9 .A25 L677 2013, ...

Pages