Security journal
| New Title: | Malaysian safety & security journal (1994) |
|---|---|
| Format: | Book |
| Published: |
Petaling Jaya
SRT-EON security services
1991-
|
| Subjects: |
Similar Items
OIC-CERT Journal of Cyber Security
International journal of cryptology research
by: Mohamad Rushdan Md. Said
Published: (2009)
by: Mohamad Rushdan Md. Said
Published: (2009)
Technologies of inSecurity the surveillance of everyday life
by: Aas, Katja Franko, et al.
Published: (2009)
by: Aas, Katja Franko, et al.
Published: (2009)
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011)
by: Purpura, Philip P. 1950-
Published: (2011)
Butterworths security dictionary terms and concepts
by: Fay, John J.
Published: (1987)
by: Fay, John J.
Published: (1987)
Wireless security
by: Osterhage, Wolfgang
Published: (2012)
by: Osterhage, Wolfgang
Published: (2012)
Wireless security models, threats and solutions
by: Nichols, Randall K., et al.
Published: (2002)
by: Nichols, Randall K., et al.
Published: (2002)
Security architecture design deployment and operations
by: King, Christopher M., et al.
Published: (2001)
by: King, Christopher M., et al.
Published: (2001)
Security of mobile communications
by: Boudriga, Noureddine
Published: (2010)
by: Boudriga, Noureddine
Published: (2010)
The craft system security
by: Smith, Sean W. 1964-, et al.
Published: (2008)
by: Smith, Sean W. 1964-, et al.
Published: (2008)
Implementing email security and tokens current standards, tools, and practices
by: Turner, Sean H., et al.
Published: (2008)
by: Turner, Sean H., et al.
Published: (2008)
Virtualization security protecting virtualized environments
by: Shackleford, Dave
Published: (2013)
by: Shackleford, Dave
Published: (2013)
Mobile application security
by: Dwivedi, Himanshu, et al.
Published: (2010)
by: Dwivedi, Himanshu, et al.
Published: (2010)
Practical embedded security building secure resource-constrained systems
by: Stapko, Timothy
Published: (2008)
by: Stapko, Timothy
Published: (2008)
Multimedia security steganography and digital water marking techniques for protection of intellectual property
by: Lu, Chun-Shein
Published: (2005)
by: Lu, Chun-Shein
Published: (2005)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Journal of Public Security and Safety
Published: (2014)
Published: (2014)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Windows NT security guide
by: Sutton, Stephen A.
Published: (1997)
by: Sutton, Stephen A.
Published: (1997)
Malaysian and Singapore company and securities law reports
Published: (1994)
Published: (1994)
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Security leader insights for effective management lessons and strategies from leading security professionals
Published: (2014)
Published: (2014)
Security studies a reader
by: Hughes, Christopher W., et al.
Published: (2011)
by: Hughes, Christopher W., et al.
Published: (2011)
Security technologies for the World Wide Web
by: Oppliger, Rolf
Published: (2000)
by: Oppliger, Rolf
Published: (2000)
Security 2020 reduce security risks this decade
by: Howard, Doug, et al.
Published: (2011)
by: Howard, Doug, et al.
Published: (2011)
Wireless network security
by: Du, Dingzhu, et al.
Published: (2007)
by: Du, Dingzhu, et al.
Published: (2007)
Understanding new security threats
Published: (2019)
Published: (2019)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Internet security professional reference
by: Atkins, Derek
Published: (1997)
by: Atkins, Derek
Published: (1997)
Similar Items
- OIC-CERT Journal of Cyber Security
-
International journal of cryptology research
by: Mohamad Rushdan Md. Said
Published: (2009) -
Technologies of inSecurity the surveillance of everyday life
by: Aas, Katja Franko, et al.
Published: (2009) -
Security an introduction
by: Purpura, Philip P. 1950-
Published: (2011) -
Butterworths security dictionary terms and concepts
by: Fay, John J.
Published: (1987)