Search Results for - Narrowed by: Computer networks -- Security measures - Data encryption (Computer science)SirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-20T18:39:17ZIntroduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-05-20T18:39:17Z2024-05-20T18:39:17Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:8211522024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:7582562024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2011<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136097044<br/>Analysis and detection of P2P botnet based on node behaviourent://SD_ILS/0/SD_ILS:8359952024-05-20T18:39:17Z2024-05-20T18:39:17Zby Mohammad Reza Rostami<br/>Author Mohammad Reza Rostami, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6436 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:6041102024-05-20T18:39:17Z2024-05-20T18:39:17Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Format: Computer file<br/>Call Number CP 025106 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamaatn maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594022024-05-20T18:39:17Z2024-05-20T18:39:17Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A99 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594062024-05-20T18:39:17Z2024-05-20T18:39:17Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz<br/>Format: Books<br/>Call Number CP 024809 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:3967172024-05-20T18:39:17Z2024-05-20T18:39:17Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 Z35 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:2820242024-05-20T18:39:17Z2024-05-20T18:39:17Zby Liu, Dale<br/>Author Liu, Dale<br/>Format: Books<br/>Call Number QA76.9.A25 L58 2009<br/>Publisher Syngress,<br/>Publication Date 2009<br/>ISBN 9781597492836<br/>Security of information and communication networksent://SD_ILS/0/SD_ILS:2821112024-05-20T18:39:17Z2024-05-20T18:39:17Zby Kartalopoulos, Stamatios V.<br/>Author Kartalopoulos, Stamatios V.<br/>Format: Books<br/>Call Number TK5105.59 K37 2009<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2009<br/>ISBN 9780470290255<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:5882922024-05-20T18:39:17Z2024-05-20T18:39:17Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 016838<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-05-20T18:39:17Z2024-05-20T18:39:17Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:3069042024-05-20T18:39:17Z2024-05-20T18:39:17Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M23 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-05-20T18:39:17Z2024-05-20T18:39:17Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithment://SD_ILS/0/SD_ILS:1961022024-05-20T18:39:17Z2024-05-20T18:39:17Zby Then, Siaw Cheik<br/>Author Then, Siaw Cheik, Samura Ali, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 T44 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithment://SD_ILS/0/SD_ILS:5765092024-05-20T18:39:17Z2024-05-20T18:39:17Zby Then, Siaw Cheik<br/>Author Then, Siaw Cheik, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 018975 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2007<br/>Encryption/decryption of heart sound signal for telemedicine applicationent://SD_ILS/0/SD_ILS:5980832024-05-20T18:39:17Z2024-05-20T18:39:17Zby Chua, Aun Geong<br/>Author Chua, Aun Geong, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 019064 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/>Encryption/decryption of heart sound signal for telemedicine applicationent://SD_ILS/0/SD_ILS:3628562024-05-20T18:39:17Z2024-05-20T18:39:17Zby Chua, Aun Geong<br/>Author Chua, Aun Geong, Sheikh Hussain Shaikh Salleh, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 C48 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Komputer)) - Universiti Teknologi Malaysia, 2007<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:1096022024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2006<br/>Edition 4th. ed.<br/>Publisher Pearson,<br/>Publication Date 2006<br/>ISBN 9780131873162<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:6150192024-05-20T18:39:17Z2024-05-20T18:39:17Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Computer file<br/>Call Number CP 6691<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254969<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:4371442024-05-20T18:39:17Z2024-05-20T18:39:17Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Books<br/>Call Number TK5105.59 B87 2004<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254952<br/>Implementing SSH : strategies for optimizing the Secure Shellent://SD_ILS/0/SD_ILS:4423382024-05-20T18:39:17Z2024-05-20T18:39:17Zby Dwivedi, Himanshu<br/>Author Dwivedi, Himanshu<br/>Format: Books<br/>Call Number QA76.76.O63 D844 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780471458807<br/>Secured messaging systement://SD_ILS/0/SD_ILS:81662024-05-20T18:39:17Z2024-05-20T18:39:17ZFormat: Visual Materials<br/>Call Number MFL 13177<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Secured messaging systement://SD_ILS/0/SD_ILS:3830422024-05-20T18:39:17Z2024-05-20T18:39:17Zby Abd. Rahim Mat Sidek<br/>Author Abd. Rahim Mat Sidek<br/>Format: Books<br/>Call Number TK5105.59 A72 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=58370">Full text</a><br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Secured messaging systement://SD_ILS/0/SD_ILS:6024532024-05-20T18:39:17Z2024-05-20T18:39:17Zby Abd. Rahim Mat Sidek<br/>Author Abd. Rahim Mat Sidek<br/>Format: Computer file<br/>Call Number CP 5835<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2003<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:3402402024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2003<br/>Edition 3rd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2003<br/>ISBN 9780130914293<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3548532024-05-20T18:39:17Z2024-05-20T18:39:17Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>Perkhidmatan penyulitan fail Microsoft Office atas talian berkonsepkan pelanggan pelayanent://SD_ILS/0/SD_ILS:72802024-05-20T18:39:17Z2024-05-20T18:39:17Zby Ng, Wee Hung<br/>Author Ng, Wee Hung<br/>Format: Visual Materials<br/>Call Number MFL 12754<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Perkhidmatan penyulitan fail Microsoft Office atas talian berkonsepkan pelanggan pelayanent://SD_ILS/0/SD_ILS:3083572024-05-20T18:39:17Z2024-05-20T18:39:17Zby Ng, Wee Hung<br/>Author Ng, Wee Hung<br/>Format: Books<br/>Call Number QA76.9.A25 N59 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Hard disk monitoring and data encryption on windows based terminalent://SD_ILS/0/SD_ILS:1166972024-05-20T18:39:17Z2024-05-20T18:39:17Zby Lee, Kong Aik<br/>Author Lee, Kong Aik<br/>Format: Books<br/>Call Number TK5105.59 L43 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Cryptronic mailent://SD_ILS/0/SD_ILS:1242352024-05-20T18:39:17Z2024-05-20T18:39:17Zby Lim, Poay Siak<br/>Author Lim, Poay Siak<br/>Format: Books<br/>Call Number QA76.9.A25 L55 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Web pages/server for medical electronics : medical surgery and emergency ... [et al.]ent://SD_ILS/0/SD_ILS:133002024-05-20T18:39:17Z2024-05-20T18:39:17Zby Lee, Chai Hong<br/>Author Lee, Chai Hong, Lee, Kong Aik, Logeswari M. Shanmugam, Low, Ho Chit, Sivalingam R. Savassamy<br/>Format: Visual Materials<br/>Call Number MFL 9737<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Cryptography and network security : principles and practicesent://SD_ILS/0/SD_ILS:1287472024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 1999<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 1999<br/>ISBN 9780138690175 9780139738197<br/>Digital cash : commerce on the netent://SD_ILS/0/SD_ILS:4681542024-05-20T18:39:17Z2024-05-20T18:39:17Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>Ciri-ciri antaramuka pengguna dalam sistem pengurusan projek dengan menggunakan platform lotus notes : satu kajian kes ke atas Syarikat Client Vision Electrical Sdn Bhd; Aplikasi pengadun dan penyunting bunyi; Garbage collection techniques; Pengoptimuman algoritma keselamatan data (data encryption standard); Sistem keselamatan rangkaian Fakulti Sains Komputer dan Sistem Maklumat; Kajian perbandingan sistem pengoperasian bagi capaian jarak jauh (windows NT dan LINUX)ent://SD_ILS/0/SD_ILS:212392024-05-20T18:39:17Z2024-05-20T18:39:17Zby Ahmad Faiz Besah @ Sitam<br/>Author Ahmad Faiz Besah @ Sitam, Anwar Awang Man, Ezzuddin Bakrin, Kamarulnizam Abu Bakar, Nirmala @ Katherine Arumugam<br/>Format: Visual Materials<br/>Call Number MFL 8678 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1996<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1996<br/>Practical cryptography for data internetworksent://SD_ILS/0/SD_ILS:4528142024-05-20T18:39:17Z2024-05-20T18:39:17Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59.S73 1996<br/>Publisher IEEE Computer Society Press,<br/>Publication Date 1996<br/>ISBN 9780818671401<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-05-20T18:39:17Z2024-05-20T18:39:17Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8605712024-05-20T18:39:17Z2024-05-20T18:39:17Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HV8079.C65 A363 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8647512024-05-20T18:39:17Z2024-05-20T18:39:17Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>NETWORK FORENSIC INVESTIGATION GUIDELINE FOR CAPTURING STEGANOGRAPHY FILES IN NETWORK TRAFFIC PACKETSent://SD_ILS/0/SD_ILS:8609202024-05-20T18:39:17Z2024-05-20T18:39:17Zby Ahmad Shukri Samsuddin, 1982-, author<br/>Author Ahmad Shukri Samsuddin, 1982-, author, Azizah Abdul Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034808 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8646792024-05-20T18:39:17Z2024-05-20T18:39:17Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>Security, Privacy and Reliability in Computer Communications and Networksent://SD_ILS/0/SD_ILS:8669672024-05-20T18:39:17Z2024-05-20T18:39:17Zby Sha, Kewei<br/>Author Sha, Kewei, Striegel, Aaron, Song, Min<br/>Format: Books<br/>Call Number TK5105.59 S43 2017<br/>ISBN 9788793379893<br/>