IT auditing : using controls to protect information assets /
Hacking exposed : web applications : web application security secrets and solutions /
Computer networks /
Cryptography and network security : principles and practice /
Understanding PKI : concepts, standards, and deployment considerations by Carlisle Adams; Steve Lloyd.
Client/Server Strategies : Implementations in the IBM Environment /
IP, Ethernet, and MPLS networks : resource and fault management /
Implementing ssl/tls using cryptography and pki /
Data communications and networking /
Communication networks /
Practical network design techniques /
Data and computer communications /
Garis panduan penilaian tahap keselamatan rangkaian dan sistem ICT sektor awam.
A multidisciplinary introduction to information security /
Mobile opportunistic networks : architectures, protocols and applications /
Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks: April 2-4, 2008, Langkawi, Malaysia/
e-Engineering & digital enterprise technology VII : selected, peer reviewed papers from the 7th International Conference on e-Engineering & Digital Enterprise Technology, August 2009 /
Metasploit : the penetration tester's guide /
Understanding data communications /
Socio-technical networks : science and engineering design /