Cyber security threat an emerging challenge to global security
Saved in:
| Main Author: | Lua, Pei Ting (Author) |
|---|---|
| Corporate Author: | Universiti Pertahanan Nasional Malaysia. Post Graduate Diploma in Strategic and Defence Studies |
| Format: | Thesis Book |
| Language: | English |
| Published: |
Kuala Lumpur
Universiti Pertahanan Nasional Malaysia
2019
|
| Series: | Tesis
Thesis |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Cyber security challenges and way forward Malaysian Armed Forces (MAF)
by: Mohd. Radzi Osman
Published: (2019)
by: Mohd. Radzi Osman
Published: (2019)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
US national cybersecurity international politics, concepts and organization
Published: (2017)
Published: (2017)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Instruction detection network security beyond the firewall
by: Escamilla
Published: (1998)
by: Escamilla
Published: (1998)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
Security + guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Conflict in cyber space theoretical, strategic and legal perspectives
Published: (2016)
Published: (2016)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Similar Items
-
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran -
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018) -
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018) -
Data analysis for network cyber-security
Published: (2014)