INTERNET CONTENT REGULATION : CONTEMPORARY LEGAL AND REGULATORY ISSUES IN THE CHANGING DIGITAL LANDSCAPE
| Main Author: | Mahyuddin Daud (Author) |
|---|---|
| Format: | Book |
| Published: |
Gombak :
IIUM Press
[2021?]
|
| Subjects: |
Similar Items
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data
by: Mitnick, Kevin
Published: (2017)
by: Mitnick, Kevin
Published: (2017)
Anti-hacker tool kit
by: Shema,Mike
Published: (2014)
by: Shema,Mike
Published: (2014)
Anti-Hacker tool kit
by: Jones, Keith J.
Published: (2002)
by: Jones, Keith J.
Published: (2002)
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)
by: Stackpole, Bill
Published: (2011)
Information technology security
Published: (2006)
Published: (2006)
Hacking exposed fifth edition : network security secrets and solutions
by: McClure, Stuart
Published: (2005)
by: McClure, Stuart
Published: (2005)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
How personal & internet security work
by: Gralla, Preston
Published: (2006)
by: Gralla, Preston
Published: (2006)
Data-driven security
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
IT governance
by: Calder, Alan
Published: (2012)
by: Calder, Alan
Published: (2012)
Auditing cloud computing : a security and privacy guide
Published: (2011)
Published: (2011)
The personal cybersecurity bible
by: Ledford, Jerri L.
Published: (2006)
by: Ledford, Jerri L.
Published: (2006)
The Complete idiot's guide to protecting yourself online
by: Gralla, Preston
Published: (1999)
by: Gralla, Preston
Published: (1999)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Software forensics : collecting evidence from the scene of a digital crime
by: Slade, Robert M.
Published: (2004)
by: Slade, Robert M.
Published: (2004)
IF IT'S SMART, IT'S VULNERABLE
by: Hypponen, Mikko
Published: (2022)
by: Hypponen, Mikko
Published: (2022)
Security in computing
by: Pfleeger, Charles P
Published: (2007)
by: Pfleeger, Charles P
Published: (2007)
19 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael
Published: (2005)
by: Howard, Michael
Published: (2005)
System assurance
by: Mansourov, Nikolai
Published: (2011)
by: Mansourov, Nikolai
Published: (2011)
Privacy and digital security
by: Fromm, Megan
Published: (2015)
by: Fromm, Megan
Published: (2015)
Computer security handbook
by: Baker, Richard H
Published: (1991)
by: Baker, Richard H
Published: (1991)
Managing cybersecurity resources : a cost-benefit analysis
by: Gordon, Lawrence A.
Published: (2006)
by: Gordon, Lawrence A.
Published: (2006)
Click here to kill everybody : security and survival in a hyper-connected world
by: Schneier, Bruce
Published: (2018)
by: Schneier, Bruce
Published: (2018)
PCI compliance : understand and implement effective PCI data security standard compliance
by: Chuvakin, Anton A.
Published: (2010)
by: Chuvakin, Anton A.
Published: (2010)
Implementing internet security
Published: (1995)
Published: (1995)
Business continuity planning for data centers and systems : A strategic implementation guide
by: Bowman, Ronald H.
Published: (2008)
by: Bowman, Ronald H.
Published: (2008)
Cybersecurity : politics, governance and conflict in cyberspace
by: Van Puyvelde, Damien
Published: (2018)
by: Van Puyvelde, Damien
Published: (2018)
Living with the internet and online dangers
by: Sandler, Corey
Published: (2010)
by: Sandler, Corey
Published: (2010)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2013)
by: Kostopoulos, George K.
Published: (2013)
Hacking exposed web applications
by: Scambray, Joel
Published: (2002)
by: Scambray, Joel
Published: (2002)
International handbook of computer security
by: Shim, Jae K
Published: (2008)
by: Shim, Jae K
Published: (2008)
Own your space : keep yourself and your stuff safe online
by: McCarthy, Linda
Published: (2007)
by: McCarthy, Linda
Published: (2007)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003)
by: Schafer, Gunter
Published: (2003)
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Similar Items
-
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data
by: Mitnick, Kevin
Published: (2017) -
Anti-hacker tool kit
by: Shema,Mike
Published: (2014) -
Anti-Hacker tool kit
by: Jones, Keith J.
Published: (2002) -
Hacking exposed 6 : network security secrets & solutions
by: McClure, Stuart
Published: (2009) -
Security strategy : from requirements to reality
by: Stackpole, Bill
Published: (2011)