IUKL Library

20170929 MQA FCMIT BIT in Multimedia Subscribe to this list

| Select titles to:
Computer security fundamentals / Chuck Easttom.

by Easttom, Chuck.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis, Ind. : Pearson, c2012Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (1). Items available for reference: IUKL Library [Call number: QA76.9 Eas] (1).
Log in to add tags.
Computer security fundamentals.

by Easttom, Chuck.

Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Eas] (3).
Computer security.

by Gollmann, Dieter.

Material type: book Book Publisher: New York : John Wiley & Sons, 1999Availability: Items available for loan: IUKL Library [Call number: QA76.9 Gol] (1).
Computer systems architecture : A networking approach Rob Williams

by Rob Williams.

Edition: 2nd edMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow : Pearson Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: QA76.9 Rob] (1).
Computer systems design and architecture / Vincent P. Heuring

by Heuring, Vincent P | Jordan, Harry F | Murdocca, Miles.

Material type: book Book Publisher: California : Addison-Wesley, 1997Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Heu] (1). Items available for reference: eLibrary (branch) [Call number: QA76.9 Heu] (1).
Concepts of database management. Philip J. Pratt.

by Pratt, Philip J | Adamski, Joseph J.

Edition: 3rd ed.Material type: book Book Publisher: Cambridge : Course Technology, 2000Availability: Items available for loan: IUKL Library [Call number: QA76.9 Pra] (2). Items available for reference: IUKL Library [Call number: QA76.9 Pra] (1).
Converged multimedia networks. Juliet Bates.

by Bates, Juliet | Gallon, Chris | Bocci, Matthew | Walker, Stuart | Taylor, Tom.

Publisher: Chichester, England : Wiley, ©2006Availability: Items available for loan: IUKL Library [Call number: TK5105.15 Con] (3). Items available for reference: IUKL Library [Call number: TK5105.15 Con] (1).
Critical infrastructure protection in homeland security : defending a networked nation / Ted G. Lewis.

by Lewis, T. G. (Theodore Gyle), 1941-.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley-Interscience, c2006Availability: Items available for reference: IUKL Library [Call number: QA76.9 Lew] (2).
Cryptography and Network Security : Principles and Practices

by William Stallings.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: Not fiction Availability: Items available for loan: IUKL Library [Call number: TK5105.59 STA] (1).
Cryptography and network security.

by Stallings. William.

Edition: 4th.Material type: book Book Publisher: New Jersey : Prentice Hall, 2006Availability: Items available for loan: IUKL Library [Call number: TK5105.59 Sta] (2). Items available for reference: IUKL Library [Call number: TK5105 Sta] (2).
Cryptography and public key infrastructure on the Internet / Klaus Schmeh.

by Schmeh, Klaus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Chichester, West Sussex, England : Wiley, c2003Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Sch] (1).
Cyber attacks : protecting national infrastructure / Edward G Amoroso, John R Vacca

by Amoroso, Edward G | Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Butterworth-Heinemann, 2013Availability: Items available for loan: eLibrary (branch) [Call number: HV6773.2 Amo] (1).
Cyber law : maximizing safety and minimizing risk in classrooms / Aimée M. Bissonette.

by Bissonette, Aimée M.

Publisher: Thousand Oaks, Calif. : Corwin Press, c2009Other title: Maximizing safety and minimizing risk in classrooms.Availability: Items available for loan: IUKL Library [Call number: KF4209 Bis] (1). Items available for reference: IUKL Library [Call number: KF4209 Bis] (1).
Cyber Law.

by Johnston, David | Handa, Sunny | Morgan, Charles.

Material type: book Book Publisher: Subang Jaya, Selangor : Pelanduk publication, 1998Availability: Items available for loan: IUKL Library [Call number: KB126 Joh] (1).
Cyber laws of Malaysia : contains Digital Signature Act 1997 (Act 562), Computer Crimes Act 1997 (Act 563), Telemedicine Act 1997 (Act 564) : as at 20th May 2004 / compiled by Legal Research Board.

by Malaysia | International Law Book Services. Legal Research Board.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Petaling Jaya, Selangor Darul Ehsan : International Law Book Services, 2013Other title: Contains Digital Signature Act 1997 (Act 562) & regulations 1998, Computer Crimes Act 1997 (Act 563), Telemedicine Act 1997 (Act 564).Availability: Items available for loan: IUKL Library [Call number: KPG80 Mal] (1). Items available for reference: IUKL Library [Call number: KPG80 Mal] (1).
Cyber laws of Malaysia.

by Malaysia.

Material type: book Book Publisher: Kuala Lumpur : International Law Book Services (ILBS), 2002Availability: Items available for loan: IUKL Library [Call number: KPG80 Cyb] (4). Items available for reference: IUKL Library [Call number: KPG80 Cyb] (1).
Cyber security and IT infrastructure protection / edited by John R. Vacca.

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress is an imprint of Elsevier, 2014Other title: Cyber security and information technology infrastructure protection.Availability: Items available for loan: eLibrary (branch) [Call number: QA76.9 Cyb] (1).
Cyber warfare and the laws of war / Heather Harrison Dinniss.

by Harrison Dinniss, Heather.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Cambridge University Press, 2012Availability: Items available for loan: IUKL Library [Call number: KZ6718 Har] (3). Items available for reference: IUKL Library [Call number: KZ6718 Har] (1).
Cyberethics : morality and law in cyberspace / Richard A. Spinello.

by Spinello, Richard A.

Edition: Fifth edition. Publisher: Burlington, MA : Jones & Bartlett Learning, [2014]Availability: Items available for loan: IUKL Library [Call number: TK5105.878 Spi] (1). Items available for reference: IUKL Library [Call number: TK5105.878 Spi] (1).
Data management for multimedia retrieval / K. Selçuk Candan, Maria Luisa Sapino.

by Candan, K. Selçuk (Kasim Selçuk) | Sapino, Maria Luisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge ; New York : Cambridge University Press, 2010Availability: Items available for loan: IUKL Library [Call number: QA76.575 Can] (3). Items available for reference: IUKL Library [Call number: QA76.575 Can] (1).
 <<    1  2  3  4  5  6  ...  13    >>
Log in to create new lists.
The Library's homepage is at http://library.iukl.edu.my/.