A HANDBOOK ON ICT SET-UP AND SECURITY

This book will attempt to highlight encompassing security areas of computer system based on ICT security point of view but in a manner logical for the regular individuals to appreciate. It will describe ICT security concerns common and peculiar to general public and professionals.

Saved in:
Bibliographic Details
Main Author: Hatta Mohd Yusoff
Format: Unknown
Published: Cheras, Kuala Lumpur Utusan Publication 2003
©2003
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-299359
005 202451015171
020 # # |a 9676114871 
090 0 0 |a QA76  |b .H38 2003 
100 1 # |a Hatta Mohd Yusoff 
245 1 2 |a A HANDBOOK ON ICT SET-UP AND SECURITY  |c Hatta Mohd Yusoff 
264 # 1 |a Cheras, Kuala Lumpur  |b Utusan Publication  |c 2003 
264 # 1 |c ©2003 
300 # # |a vi, 111 pages  |b illustrations  |c 22 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
520 # # |a This book will attempt to highlight encompassing security areas of computer system based on ICT security point of view but in a manner logical for the regular individuals to appreciate. It will describe ICT security concerns common and peculiar to general public and professionals. 
650 # 0 |a Electronic data processing 
650 # 0 |a Information technology 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=299359 
964 # # |c BOK  |d 01 
040 # # |a Shah Alam 
998 # # |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2||