{"id":9060,"date":"2022-08-02T08:56:45","date_gmt":"2022-08-02T00:56:45","guid":{"rendered":"http:\/\/subjects.upm.edu.my\/sg\/?page_id=9060"},"modified":"2022-08-02T09:15:29","modified_gmt":"2022-08-02T01:15:29","slug":"network_security_refworks","status":"publish","type":"page","link":"http:\/\/subjects.upm.edu.my\/sg\/?page_id=9060","title":{"rendered":"network_security_refworks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9060\" class=\"elementor elementor-9060\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a99 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a99\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57e0\" data-id=\"57e0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6786 elementor-widget elementor-widget-heading\" data-id=\"6786\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xxl\">Reference Works - network security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee9926b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee9926b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e31364\" data-id=\"8e31364\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b37d802 elementor-tabs-view-vertical elementor-widget elementor-widget-tabs\" data-id=\"b37d802\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1881\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1881\" aria-expanded=\"false\">Dictionaries<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1882\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1882\" aria-expanded=\"false\">Directories<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1883\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1883\" aria-expanded=\"false\">Encyclopedias<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1884\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1884\" aria-expanded=\"false\">Guides<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1885\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1885\" aria-expanded=\"false\">Handbooks \/ Manuals<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1886\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1886\" aria-expanded=\"false\">Patents<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1887\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1887\" aria-expanded=\"false\">Standards<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1888\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1888\" aria-expanded=\"false\">Statistics<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1889\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1889\" aria-expanded=\"false\">Glossaries<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1881\" aria-expanded=\"false\">Dictionaries<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1881\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1881\" tabindex=\"0\" hidden=\"false\"><ul><li>Net speak : the internet dictionary \/ Tom Fahey, edited by Ruffin Prevost.\u00a0 <strong>TK5105.875 I57F157<\/strong><\/li><li>The international dictionary of data communications \/ Robert A. Saigh.\u00a0 <strong>TK5102 S132<\/strong><\/li><li>Data &amp; telecommunications dictionary \/ Julie K. Petersen.\u00a0 <strong>TK5102 P484<\/strong><\/li><li>McGraw-Hill data communications dictionary : definitions and descriptions of general and SNA terms, recommendations, standards, interchange codes, IBM communications products, and units of measure \/ William F. Potts ; Uyless Black, consulting editor.\u00a0 <strong>TK5105 P871<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1882\" aria-expanded=\"false\">Directories<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1882\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1882\" tabindex=\"0\" hidden=\"hidden\"><ul><li>The NAT handbook : implementing and managing network address translation \/ Bill Dutcher.\u00a0 <strong>TK5105.595 D975<\/strong><\/li><li>Mission-critical active directory : architecting a secure and scalable infrastructure for windows 2000 \/ Micky Balladelli, Jan De Clercq.\u00a0 <strong>TK5105.595 B188<\/strong><\/li><li>Administering active directory \/ Mark Wilkins.\u00a0 <strong>TK5105.595 W685<\/strong><\/li><li>Understanding and deploying LDAP directory services \/ Timothy A. Howes, Mark C. Smith, Gordon S. Good.\u00a0 <strong>TK5105.595 H859<\/strong><\/li><li>Internet directories : how to build and manage applications for LDAP, DNS, and other directories \/ Bruce Greenblatt.\u00a0 <strong>TK5105.595 G798<\/strong><\/li><li>Administering NDS \/ Nancy Cadjan, Jeffrey Harris.\u00a0 <strong>TK5105.595 C124<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1883\" aria-expanded=\"false\">Encyclopedias<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1883\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1883\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Encyclopedia of information ethics and security \/ Marian Quigley, editor.\u00a0 <strong>HM851 E56<\/strong><\/li><li>Hack attacks encyclopedia : a complete history of hacks, cracks, phreaks, and spies over time \/ John Chirillo.\u00a0 <strong>QA76.9 A25C541<\/strong><\/li><li style=\"list-style-type: none;\">\u00a0<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1884\" aria-expanded=\"false\">Guides<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1884\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1884\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Security+ guide to network security fundamentals \/ Mark Ciampa.\u00a0 <strong>TK5105.59 C565 2012<\/strong><\/li><li>Guide to firewalls and network security with intrusion detection and VPNs \/ By Michael E. Whitman.\u00a0 <strong>TK5105.59 W615 2009<\/strong><\/li><li>Firewalls : a complete guide \/ Marcus Goncalves.\u00a0 <strong>TK5105.59 G635<\/strong><\/li><li>CCSP Cisco secure PIX Firewall advanced exam certification guide \/ Greg Bastien, Earl Carter, Christain Abera Degu.\u00a0 <strong>TK5105.59 B326 2005<\/strong><\/li><li>CCNA security exam cram \/ Eric L. Stewart.\u00a0 <strong>TK5105.59 S849<\/strong><\/li><li>The CEH prep guide : the comprehensive guide to certified ethical hacking \/ Ronald L. Krutz, Russell Dean Vines.\u00a0 <strong>QA76.9 A25K94<\/strong> <\/li><li>Security+ guide to network security fundamentals \/ Mark Ciampa.\u00a0 <strong>TK5105.59 C565 2012<\/strong><\/li><li>Guide to network defense and countermeasures \/ Randy Weaver, Dawn Weaver, Dean Farwood.\u00a0 <strong>TK5105.59 W363 2014<\/strong><\/li><li>Web security : a step-by-step reference guide \/ Lincoln D. Stein.\u00a0 <strong>TK5105.59 S819<\/strong><\/li><li>The Internet security guidebook : from planning to deployment \/ Juanita Ellis, Tim Speed.\u00a0 <strong>TK5105.59 E47<\/strong><\/li><li>Network security : a beginner&#8217;s guide \/ Eric Maiwald.\u00a0 <strong>TK5105.59 M232 2003<\/strong><\/li><li>Hacking exposed : network security secrets and solutions \/ Stuart McClure, Joel Scambray, George Kurtz.\u00a0 <strong>TK5105.59 M128<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1885\" aria-expanded=\"false\">Handbooks \/ Manuals<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1885\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1885\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Computer and information security handbook \/ edited by John R. Vacca.\u00a0 <strong>QA76.9 A25C738 2013<\/strong><\/li><li>Handbook of security and networks \/ edited by Yang Xiao, Frank H. Li &amp; Hui Chen.\u00a0 <strong>TK5105.59 H236<\/strong><\/li><li>The browser hacker&#8217;s handbook \/ Wade Alcorn, Christian Frichot, Michele Orru.\u00a0 <strong>TK5105.59 A354<\/strong><\/li><li>Network attacks and defenses : a hands-on approach \/ Zouheir Trabelsi &#8230; [et al.].\u00a0 <strong>TK5105.59 N476<\/strong><\/li><li>Cyber warfare : techniques, tactics and tools for security practitioners \/ Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.\u00a0 <strong>U163 A561 2014<\/strong><\/li><li>The browser hacker&#8217;s handbook \/ Wade Alcorn, Christian Frichot, Michele Orru.\u00a0 <strong>TK5105.59 A354<\/strong><\/li><li>The hacker&#8217;s handbook : the strategy behind breaking into and defending networks \/ Susan Young, Dave Aitel.\u00a0 <strong>TK5105.59 Y76<\/strong><\/li><li>Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes \/ Albert J. Marcella, Jr., Doug Menendez.\u00a0 <strong>HV8079 C65C994 2008<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1886\" aria-expanded=\"false\">Patents<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1886\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1886\" tabindex=\"0\" hidden=\"hidden\"><ul><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10367844B2\/en?q=network+security&amp;oq=network+security\">Systems and methods of network security and threat management (US10367844B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10412103B2\/en?q=network+security&amp;oq=network+security\">Techniques for sharing network security event information (US10412103B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/EP3399716B1\/en?q=network+security&amp;oq=network+security\">Network security threat intelligence sharing (EP3399716B1)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US11050712B2\/en?q=network+security&amp;oq=network+security\">System and method for implementing content and network security inside a chip (US11050712B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10432674B1\/en?q=network+security&amp;oq=network+security\">Scalable network security with fast response protocol (US10432674B1)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US11151258B2\/en?q=network+security&amp;oq=network+security&amp;page=1\">System and method for identifying network security threats and assessing network security (US11151258B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10243997B2\/en?q=network+security&amp;oq=network+security&amp;page=1\">Secure and lightweight traffic forwarding systems and methods to cloud based network security systems (US10243997B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10848510B2\/en?q=network+security&amp;oq=network+security&amp;page=1\">Selecting network security event investigation timelines in a workflow environment (US10848510B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\"><strong><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US11132111B2\/en?q=network+security&amp;oq=network+security&amp;page=2\">Assigning workflow network security investigation actions to investigation timeline (US11132111B2)<\/a><\/strong><\/span><\/span><\/li><li><span style=\"text-decoration: underline;\"><strong><span style=\"color: #0000ff; text-decoration: underline;\"><a style=\"color: #0000ff; text-decoration: underline;\" href=\"https:\/\/patents.google.com\/patent\/US10862920B2\/en?q=network+security&amp;oq=network+security&amp;page=3\">Systems and methods for dynamic network security control and configuration (US10862920B2)<\/a><\/span><\/strong><\/span><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1887\" aria-expanded=\"false\">Standards<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1887\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1887\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Computer networks: protocols, standards, and interfaces \/ Uyless Black.\u00a0 <strong>TK5105.5 B627<\/strong> <\/li><li>Network security essentials : applications and standards \/ William Stallings.\u00a0<strong> TK5105.59 S782 2007<\/strong><\/li><li>IPSec : the new security standard for the Internet, intranets, and virtual private networks \/ Naganand Doraswamy, Dan Harkins.\u00a0 <strong>TK5105.567 D694<\/strong><\/li><li>Network security : an introduction to techniques &amp; standard \/ Kamaruzzaman Seman, Shaharudin Ismail, Waidah Ismail.\u00a0 <strong>TK5105.59 K15<\/strong><\/li><li>Implementing cybersecurity : a guide to the National Institute of Standards and Technology Risk Management Framework \/ Anne Kohnke, Ken Sigler and Dan Shoemaker.\u00a0 <strong>QA76.9 A25K79<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1888\" aria-expanded=\"false\">Statistics<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1888\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1888\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Computer intrusion detection and network monitoring : a statistical viewpoint \/ David J. Marchette. <strong>QA76.9 A25M317<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1889\" aria-expanded=\"false\">Glossaries<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1889\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1889\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Network glossary for beginners \/ Saadiah Yahya &#8230; [et al.].\u00a0 <strong>TK5105.5 N476<\/strong><\/li><\/ul><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Reference Works &#8211; network security Dictionaries Directories Encyclopedias Guides Handbooks \/ Manuals Patents Standards Statistics Glossaries Dictionaries Net speak : the internet dictionary \/ Tom Fahey, edited by Ruffin Prevost.\u00a0 TK5105.875 I57F157 The international dictionary of data communications \/ Robert A. Saigh.\u00a0 TK5102 S132 Data &amp; telecommunications dictionary \/ Julie K. Petersen.\u00a0 TK5102 P484 McGraw-Hill&hellip; <a class=\"more-link\" href=\"http:\/\/subjects.upm.edu.my\/sg\/?page_id=9060\">Continue reading <span class=\"screen-reader-text\">network_security_refworks<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/9060"}],"collection":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9060"}],"version-history":[{"count":4,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/9060\/revisions"}],"predecessor-version":[{"id":9073,"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=\/wp\/v2\/pages\/9060\/revisions\/9073"}],"wp:attachment":[{"href":"http:\/\/subjects.upm.edu.my\/sg\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}