Skip to main content
Perbadanan Perpustakaan Awam Kedah
Lists
Public lists
akan datang
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Search the catalog in:
All libraries
Perpustakaan Alor Setar
Perpustakaan Awam Sungai Petani
Perpustakaan Baling
Perpustakaan Bandar Baharu
Perpustakaan Digital Kedah
Perpustakaan Jitra
Perpustakaan Kuala Nerang
Perpustakaan Kulim
Perpustakaan Langkawi
Perpustakaan Merbok
Perpustakaan Pendang
Perpustakaan Sik
Perpustakaan Yan
Bergerak 1, Alor Setar
Bergerak 3, Baling
Bergerak 4, Sungai Petani
Bergerak 5, Kulim
e-Pustaka 2 - Alor Setar
PD01, Kg. Bendang Raja, Kuala Nerang
PD02, Kg. Banggol Besi, Pendang
PD03, Kg. Pulau Pisang, Jitra
PD04, Kg. Bukit Nambua, Kuala Nerang
PD05, Kg. Lindungan Raja, Kulim
PD06, Kg. Kepala Bukit, Pendang
PD07, Kg. Jelutong, Sik
PD08, Felda Gunung Bongsu, Kulim
PD11, Felda Teloi Kanan, Kuala Ketil
PD12, Kg. Padang, Baling
PD13, KEDA Lahar Tunjung, Pendang
PD14, Felda Sungai Tiang, Pendang
PD15, Kg. Naga, Kepala Batas
PD16, Kg. Jelai, Pendang
PD17, Kg. Binjul, Kuala Ketil
PD18, Kg. Wang Tepus, Jitra
PD19, KEDA Bendang Perang, Kota Setar
PD20, Felda Lubuk Merbau, Pendang
PD21, Kg. Tengah, Jerlun
PD23, Taman Mas Merah, Titi Gajah, Alor Setar
PD24, Felda Bukit Tangga, Bukit Kayu Hitam
PD25, KEDA Batu 13, Pokok Sena
PD27, Kg. Bendang Bukit, Pendang
PD28, Kg. Paya Kerchut, Pendang
PD29, Kg. Gajah Putih, Sik
PD30, Bandar Baru Beris Jaya, Sik
PD31, Kg. Gelam, Bedong
PD33, Kg. Belau, Merbok
PD34, Kg. Pantai Prai
PD35, Kg. Sungai Daun, Yan
PD36, Kg. Kuala Lanjut, Kota Star
PD37, Kg. Belat, Pendang
PD38, KEDA Tanjung Setol, Pendang
PD39, Felda Bukit Tembaga, Kuala Nerang
Perpustakaan
Advanced search
Tag cloud
Log in to your account
Card number or username:
Password:
Forgot your password?
Create an account
Home
Advanced search
Results of search for 'su:"Computer networks - Security measures"'
Refine your search
Availability
Limit to records with available items
Authors
Amoroso, Edward G.
Bejtlich, Richard
Cerra, Allison
Chan, Kennis
Davis, Chris
Hanqing, Wu
Horton, Mike
Kae, Merike
Kegerreis, Mike
Maiwald, Eric
McCarthy, Linda
McClure, Stuart
Sakinah Ali Pitchay
Scambray, Joel
Schiller, Mike
Steinberg, Joseph
Wrozek, Brian
Show more
Show less
Collections
RFID
RFIDTI
Home libraries
PD15, Kg. Naga, Kepala Batas
PD30, Bandar Baru Beris Jaya, Sik
PD31, Kg. Gelam, Bedong
PD33, Kg. Belau, Merbok
PD35, Kg. Sungai Daun, Yan
PD36, Kg. Kuala Lanjut, Kota Star
PD37, Kg. Belat, Pendang
PD39, Felda Bukit Tembaga, Kuala Nerang
Perpustakaan Alor Setar
Perpustakaan Awam Sungai Petani
Perpustakaan Baling
Perpustakaan Jitra
Perpustakaan Kulim
Perpustakaan Langkawi
T-PD32, Kg. Thye Eng, Bedong
Show more
Show less
Item types
Book
Locations
Pinjaman Dewasa
Rujukan Dewasa
Series
Integration of Naqli...
LEARNING MADE EASY
Routledge studies in...
Siri komputer DIY
Topics
Business enterprises
Computer networks
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer networks se...
Computer security
Computer security. ;...
Cyberspace operation...
Electronic data proc...
Government publicati...
Informations
Show more
Show less
Your search returned 19 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to list
New list
Results
Image from Google Jackets
Hacking exposed : network security secrets & solutions
by
Scambray, Joel
[author]
[author]
Publisher:
Berkeley :
Osborne/McGraw-Hill ,
2001
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 SCA
.
Perpustakaan Awam Sungai Petani: Not For Loan
(1)
Call number:
R 005.8 SCA
.
Save to lists
Image from Google Jackets
Rangkaian kawasan setempat
Series:
Siri komputer DIY
Publisher:
Taiwan :
Kings Information ,
2003
Availability:
Items available for loan:
Perpustakaan Alor Setar
(1)
Call number:
004.68 RAN
.
Perpustakaan Awam Sungai Petani
(1)
Call number:
004.68 RAN
.
Perpustakaan Baling
(1)
Call number:
004.68 RAN
.
Perpustakaan Jitra
(1)
Call number:
004.68 RAN
.
PD15, Kg. Naga, Kepala Batas
(1)
Call number:
004.68 RAN
.
PD35, Kg. Sungai Daun, Yan
(1)
Call number:
004.68 RAN
.
PD37, Kg. Belat, Pendang
(1)
Call number:
004.68 RAN
.
PD39, Felda Bukit Tembaga, Kuala Nerang
(1)
Call number:
004.68 RAN
.
Items available for reference:
PD31, Kg. Gelam, Bedong: Not For Loan
(1)
Call number:
R 004.68 RAN
.
Place hold
Save to lists
Image from Google Jackets
Network security : a beginner's guide
by
Maiwald, Eric
[author]
Edition:
2nd. ed.
Publisher:
New York :
McGraw-Hill ,
2003
Availability:
Items available for reference:
Perpustakaan Kulim: Not For Loan
(1)
Call number:
R 005.8 MAI
.
Save to lists
Image from Google Jackets
Hacknotes : network security portable reference
by
Horton, Mike
[author]
[author]
Publisher:
New York :
McGraw-Hill ,
2003
Availability:
Items available for reference:
Perpustakaan Kulim: Not For Loan
(1)
Call number:
R 005.8 HOR
.
Save to lists
Image from Google Jackets
Hacking exposed : Windows server 2003
by
Scambray, Joel
[author]
[author]
Publisher:
New York :
McGraw-Hill ,
2003
Availability:
Items available for reference:
Perpustakaan Kulim: Not For Loan
(1)
Call number:
R 005.8 SCA
.
Save to lists
Image from Google Jackets
Extrusion detection : security monitoring for internal intrusions
by
Bejtlich, Richard
[author]
Publisher:
Upper Saddle River, New Jersey :
Addison-Wesley ,
2006
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 BEJ
.
Save to lists
Image from Google Jackets
Designing Network Security a practical guide to creating a secure network infrastructure
by
Kae, Merike
[author]
Publisher:
Indianapolis, Indiana :
Cisco Press ,
1999
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 KAE
.
Save to lists
Image from Google Jackets
Network security : a beginner's guide
by
Maiwald, Eric
[author]
Edition:
3rd ed.
Publisher:
New York :
McGraw-Hill ,
2013
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(2)
Call number:
R 005.8 MAI, ..
.
Save to lists
Image from Google Jackets
Security automation essentials : streamlined enterprise security management & monitoring with SCAP
by
[author]
Publisher:
New York :
McGraw-Hill ,
2012
Availability:
Items available for loan:
Perpustakaan Alor Setar
(1)
Call number:
005.8 SEC
.
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 SEC
.
Place hold
Save to lists
Image from Google Jackets
Network security and communication engineering : Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), 25-26, D
by
Chan, Kennis
[editor]
Publisher:
Boca Raton, Florida :
CRC Press, Taylor & Francis Group ,
2015
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 INT
.
Save to lists
Image from Google Jackets
Web security : a whitehat perspective
by
Hanqing, Wu
[author]
[author]
Publisher:
Boca Raton, Florida :
Taylor & Francis, CRC Press ,
2015
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 HAN
.
Save to lists
Image from Google Jackets
Conflict in cyber space : theoretical, strategic and legal perspectives
Series:
Routledge studies in conflict, security and technology
Publisher:
London :
Routledge ,
2016
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 355.4 CON
.
Save to lists
Image from Google Jackets
Intranet security : stories from the trenches
by
McCarthy, Linda
[author]
Publisher:
California :
Sun Microsystems Press ,
1998
Availability:
Items available for reference:
Perpustakaan Awam Sungai Petani: Not For Loan
(1)
Call number:
R 005.8 MCC
.
Save to lists
Image from Google Jackets
Hacking exposed : network security secrets and solutions
by
McClure, Stuart
[author]
Publisher:
Berkeley, California :
Osborne/McGraw-Hill ,
1999
Availability:
Items available for reference:
Perpustakaan Awam Sungai Petani: Not For Loan
(1)
Call number:
R 005.8 MCC
.
Save to lists
Image from Google Jackets
PCweek Intranet and Internet Firewall strategies
by
Amoroso, Edward G
[author]
[author]
Publisher:
Emeryville, California :
Ziff-Davis Press ,
1996
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 AMO
.
Perpustakaan Awam Sungai Petani: Not For Loan
(1)
Call number:
R 005.8 AMO
.
Perpustakaan Jitra: Not For Loan
(1)
Call number:
R 005.8 AMO
.
Perpustakaan Kulim: Not For Loan
(1)
Call number:
R 005.8 AMO
.
Save to lists
Image from Google Jackets
The Integration of Naqli and Aqli in Information Security and Assurance from THE ISLAMIC & TECHNOLOGICAL PERSPECTIVES /
Editor: Sakinah Ali Pitchay
by
Sakinah Ali Pitchay
[editor.]
Series:
Integration of naqli and aqli series
Publisher:
Bandar Baru, Nilai, Negeri Sembilan :
USIM PRESS, Universiti Sains Islam Malaysia,
2019
Availability:
Items available for loan:
Perpustakaan Alor Setar
(1)
Call number:
005.8 INT
.
Perpustakaan Awam Sungai Petani
(1)
Call number:
005.8 INT
.
Perpustakaan Jitra
(1)
Call number:
005.8 INT
.
Perpustakaan Kulim
(1)
Call number:
005.8 INT
.
Perpustakaan Langkawi
(1)
Call number:
005.8 INT
.
Place hold
Save to lists
Image from Google Jackets
IT Auditing : Using Controls to Protect Information Assets /
Mike Kegerreis, Mike Schiller, Chris Davis with Brian Wrozek
by
Kegerreis, Mike
[author.]
Schiller, Mike
[author.]
Davis, Chris
[author.]
Wrozek, Brian
[author.]
Edition:
Third Edition
Publisher:
New York :
McGraw-Hill,
2020
Copyright date:
©2020
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 KEG
.
Save to lists
Image from Google Jackets
The CYBERSECURITY PLAYBOOK : How every leader and employee can contribute to a culture of security /
ALLISON CERRA
by
Cerra, Allison
[author.]
Publisher:
Hoboken, New Jersey :
John Wiley & Sons, Inc.,
[2019]
Copyright date:
©2019
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 CER
.
Save to lists
Image from Google Jackets
Cybersecurity /
by Joseph Steinberg
by
Steinberg, Joseph, (Cybersecurity expert)
[author.]
Series:
Learning made easy for dummies
Publisher:
Hoboken, New Jersey :
John Wiley & Sons, Inc.,
©2020
Availability:
Items available for reference:
Perpustakaan Alor Setar: Not For Loan
(1)
Call number:
R 005.8 STE
.
Save to lists