Mitigating cyber security threats in Brunei Darussalam issues and challenges
Saved in:
| Main Author: | Mohammad Nooryasdie Yahya (Author) |
|---|---|
| Corporate Author: | Universiti Pertahanan Nasional Malaysia. Executive Diploma in Strategic and Defence Studies |
| Format: | Thesis Book |
| Language: | English |
| Series: | Thesis
Tesis |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Brunei Darussalam Independence 1984 the memorable year of 1984 'a new nation was born'
by: Chong, Teck Choy
Published: (2015)
by: Chong, Teck Choy
Published: (2015)
Sambutan ulang tahun hari kebangsaan negara Brunei Darussalam kelapan1992 hari Ahad, 19 Syaaban 1412 bersamaan 23 Februari 1992
Published: (1992)
Published: (1992)
Teacher empowerment and cultural context the case of Brunei Darussalam
by: Thomas, Shanthi
Published: (2018)
by: Thomas, Shanthi
Published: (2018)
Brunei, sebuah negara Islam latar belakang keislamannya
by: Shukri Zain
Published: (1996)
by: Shukri Zain
Published: (1996)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Advanced photography 2013-2014 explore, capture, share
Published: (2014)
Published: (2014)
Dirgahayu kenang-kenangan sempena hari keputeraan Kebawah Duli Yang Maha Mulia Paduka Seri Baginda Sultan dan Yang Di-Pertuan Negara Brunei Darussalam yang ke-44 tahun 1990
Published: (1990)
Published: (1990)
Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks at the national level
Published: (2018)
Published: (2018)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Cyber-security and threat politics US efforts to secure the information age
by: Dunn Cavelty, Myriam
Published: (2007)
by: Dunn Cavelty, Myriam
Published: (2007)
Threat modeling designing for security
by: Shostack, Adam
Published: (2014)
by: Shostack, Adam
Published: (2014)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
Pencapaian dan aspirasi ABDB 1961-2011 dan seterusnya = Journey of accomplishments and aspirations : RBAF 1961-2011 and beyond
by: Hussainmiya, B. A. (Bachamiya Abdul), et al.
Published: (2013)
by: Hussainmiya, B. A. (Bachamiya Abdul), et al.
Published: (2013)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
Memperingati puja usia 50 tahun Honouring 50 years
Published: (1996)
Published: (1996)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber crime and digital evidence
Published: (2015)
Published: (2015)
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
Understanding new security threats
Published: (2019)
Published: (2019)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
Cyber security challenges and way forward Malaysian Armed Forces (MAF)
by: Mohd. Radzi Osman
Published: (2019)
by: Mohd. Radzi Osman
Published: (2019)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer security art and science
by: Bishop lhMatt
by: Bishop lhMatt
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
Similar Items
-
Brunei Darussalam Independence 1984 the memorable year of 1984 'a new nation was born'
by: Chong, Teck Choy
Published: (2015) -
Sambutan ulang tahun hari kebangsaan negara Brunei Darussalam kelapan1992 hari Ahad, 19 Syaaban 1412 bersamaan 23 Februari 1992
Published: (1992) -
Teacher empowerment and cultural context the case of Brunei Darussalam
by: Thomas, Shanthi
Published: (2018) -
Brunei, sebuah negara Islam latar belakang keislamannya
by: Shukri Zain
Published: (1996) -
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)