Kursus Keselamatan Server 13-14 Mei 2025.
| Format: | Book |
|---|---|
| Language: | Malay |
| Published: |
Kajang:
Institut Penilaian Negara (INSPEN),
2025.
|
| Series: | Program Latihan 2025
|
| Subjects: |
Similar Items
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000)
by: Pipkin, Donald L.
Published: (2000)
Privacy, regulations, and cybersecurity : the essential business guide
by: Moschovitis, Christos J. P.
Published: (2021)
by: Moschovitis, Christos J. P.
Published: (2021)
Data rescue
Published: (2006)
Published: (2006)
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005)
by: Rothke, Ben
Published: (2005)
Microsoft exchange server 2007 : a beginner's guide
by: Cavalancia,Nick
Published: (2008)
by: Cavalancia,Nick
Published: (2008)
Windows Server 2003 : menguasai sistem operasi
by: Abdul Latiff Esa
Published: (2004)
by: Abdul Latiff Esa
Published: (2004)
Writing Information Security Policies
by: Barman, Scott
Published: (2002)
by: Barman, Scott
Published: (2002)
Secrets & lies : digital security in a networked world
by: Schneier, Bruce
Published: (2000)
by: Schneier, Bruce
Published: (2000)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman
Published: (2007)
by: Kamaruzzaman Seman
Published: (2007)
Microsoft Windows security : essentials
by: Gibson,Darril
Published: (2011)
by: Gibson,Darril
Published: (2011)
Pengenalan kepada keselamatan komputer
by: Omar Zakaria
Published: (2002)
by: Omar Zakaria
Published: (2002)
Hacking exposed : web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Hacker V : pakar keselamatan rangkaian : Norton internet security
by: PC, Man
Published: (2003)
by: PC, Man
Published: (2003)
Kursus kesihatan dan keselamatan bangunan : 25 - 27 Mei 2015
Security in Computing
by: Pfleeger, Charles P.
Published: (1997)
by: Pfleeger, Charles P.
Published: (1997)
Secure networking, with windows 2000 and trust services
by: Jalal Feghhi
Published: (2001)
by: Jalal Feghhi
Published: (2001)
Kursus Keselamatan Perlindungan : 23 - 25 Januari 2006
Published: (2006)
Published: (2006)
Client/server information systems : a business-oriented appraoch
by: Goldman, James E.
by: Goldman, James E.
It auditing : using control to protect information assets
by: Davis,Chris
Published: (2011)
by: Davis,Chris
Published: (2011)
Internet in security
by: Hahn, Harley
Published: (2002)
by: Hahn, Harley
Published: (2002)
Cyber security management : a governance, risk and compliance framework
by: Trim, Peter R.J, et al.
Published: (2014)
by: Trim, Peter R.J, et al.
Published: (2014)
Maximum security
Published: (2001)
Published: (2001)
Guide to using @ Risk : Risk analysis simulation Add-In for Microsoft Excel
Published: (2001)
Published: (2001)
Access denied : The complete guide to protecting your business online
by: McCallough, Jack
Published: (2001)
by: McCallough, Jack
Published: (2001)
Computer security : principles and practices
by: Stailings, William
Published: (2012)
by: Stailings, William
Published: (2012)
Viruses Revealed
by: Harley, David
Published: (2001)
by: Harley, David
Published: (2001)
The microsoft SQL server survival guide
by: Panttaja, JIM
Published: (1996)
by: Panttaja, JIM
Published: (1996)
Managing information security : a program for the electronic information age
by: Schweitzer, James A.
Published: (1982)
by: Schweitzer, James A.
Published: (1982)
Internet Security for Your Macintosh : a guide for the rest of US
by: Oppenheimer, Alan B.
Published: (2001)
by: Oppenheimer, Alan B.
Published: (2001)
Linux security
by: Vulpecula
Published: (2004)
by: Vulpecula
Published: (2004)
Security+ Guide to Network Security Fundamentals
by: Ciampa, Mark
Published: (2005)
by: Ciampa, Mark
Published: (2005)
Security and crime prevention in libraries
Published: (1992)
Published: (1992)
Facility manager's guide to security : protecting your assets
by: Reid, Robert N.
Published: (2005)
by: Reid, Robert N.
Published: (2005)
Building security : Handbook for architectural plamnning and design
by: Nadel, Barbara A
Published: (2004)
by: Nadel, Barbara A
Published: (2004)
Electrical and mechanical services in high rise buildings : design and estimation manual
by: Mittal, A.K
Published: (2007)
by: Mittal, A.K
Published: (2007)
Managing cyber risk
by: Evans, Ariel
Published: (2019)
by: Evans, Ariel
Published: (2019)
The complete idiot's guide to microsoft windows 2000 server
by: Habraken, Joe
Published: (2000)
by: Habraken, Joe
Published: (2000)
Construction site security
by: Earnshaw, Leonard
Published: (1984)
by: Earnshaw, Leonard
Published: (1984)
The malaysian public sector information security risk assessment methodology (MyRAM) handbook
Published: (2005)
Published: (2005)
The malaysian public sector information security risk assessment methodology (MyRAM)
Published: (2005)
Published: (2005)
Similar Items
-
Information security : protecting the global enterprise
by: Pipkin, Donald L.
Published: (2000) -
Privacy, regulations, and cybersecurity : the essential business guide
by: Moschovitis, Christos J. P.
Published: (2021) -
Data rescue
Published: (2006) -
Computer security : 20 things every employee should know
by: Rothke, Ben
Published: (2005) -
Microsoft exchange server 2007 : a beginner's guide
by: Cavalancia,Nick
Published: (2008)