Search Results for - Narrowed by: Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-20T13:47:16Z Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives ent://SD_ILS/0/SD_ILS:882324 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Gupta, Brij, Dr., 1982-, editor<br/>Author&#160;Gupta, Brij, Dr., 1982-, editor,&#160;Agrawal, Dharma P., Dr., editor,&#160;Wang, Haoxiang, Dr., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C668 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815371335<br/> Security in IoT-Enabled Space ent://SD_ILS/0/SD_ILS:882284 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Al-Turjman, Fadi, author<br/>Author&#160;Al-Turjman, Fadi, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 A48 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780367111236<br/> Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications ent://SD_ILS/0/SD_ILS:873241 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Song, Houbing, editor<br/>Author&#160;Song, Houbing, editor,&#160;Fink, Glenn A., editor,&#160;Jeschke, Sabina, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S434 2018<br/>Edition&#160;First edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119226048<br/> CYBERSECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:882336 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Brooks, Charles J., author<br/>Author&#160;Brooks, Charles J., author,&#160;Grow, Christophe, author,&#160;Craig, Philip, author,&#160;Short, Donald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B76 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119362395<br/> Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies ent://SD_ILS/0/SD_ILS:873236 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Winkler, Ira, author<br/>Author&#160;Winkler, Ira, author,&#160;Gomes, Araceli Treu, author,&#160;Shackleford, Dave, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W56 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9780128093160<br/> Advanced Penetration Testing : Hacking the World's Most Secure Networks ent://SD_ILS/0/SD_ILS:873238 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Allsopp, Wil, author<br/>Author&#160;Allsopp, Wil, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A4544 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119367680<br/> Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Cloud computing three-factor user authentication framework and protocols for telecare medical information system ent://SD_ILS/0/SD_ILS:849174 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zeeshan Siddiqui, 1979-, author<br/>Author&#160;Zeeshan Siddiqui, 1979-, author,&#160;Abdul Hanan Abdullah, supervisor,&#160;Muhammad Khurram Khan, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;R858 Z33 2015 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Online psychographic model for insider identification ent://SD_ILS/0/SD_ILS:849188 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ikuesan Richard Adeyemi, 1983-, author<br/>Author&#160;Ikuesan Richard Adeyemi, 1983-, author,&#160;Shukor Abdul Razak, supervisor,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849188.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhanced framework for alert processing using clustering approach based on artifical immune system ent://SD_ILS/0/SD_ILS:849204 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ashara Banu Mohamed, 1969-, author<br/>Author&#160;Ashara Banu Mohamed, 1969-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849204.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer) - Universiti Teknologi Malaysia, 2015<br/> Gravitational search algorithm-based anomly intrusion detection system ent://SD_ILS/0/SD_ILS:849341 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Salima Omar M. Hamad, 1963-, author<br/>Author&#160;Salima Omar M. Hamad, 1963-, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849341.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhanced framework for alert processing using clustering approach based on artifical immune system ent://SD_ILS/0/SD_ILS:851362 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ashara Banu Mohamed, 1969-, author<br/>Author&#160;Ashara Banu Mohamed, 1969-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054731 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Gravitational search algorithm-based anomly intrusion detection system ent://SD_ILS/0/SD_ILS:851502 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Salima Omar M. Hamad, 1963- , author<br/>Author&#160;Salima Omar M. Hamad, 1963- , author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054786 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Cloud computing three-factor user authentication framework and protocols for telecare medical information system ent://SD_ILS/0/SD_ILS:851523 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zeeshan Siddiqui, 1979-, author<br/>Author&#160;Zeeshan Siddiqui, 1979-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054792 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> Online psychographic model for insider identification ent://SD_ILS/0/SD_ILS:851360 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ikuesan Richard Adeyemi, 1983-<br/>Author&#160;Ikuesan Richard Adeyemi, 1983-<br/>Format:&#160;Books<br/>Call Number&#160;CP 054732 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Developing network vulnerability prediction and detection application ent://SD_ILS/0/SD_ILS:859448 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mehran Janfeshan, 1987-, author<br/>Author&#160;Mehran Janfeshan, 1987-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M44 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Public key infrastructure authentication framework (PKIAF) for Malaysian public sector ent://SD_ILS/0/SD_ILS:859477 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Noraida Aman Nor, 1985-, author<br/>Author&#160;Noraida Aman Nor, 1985-, author,&#160;Ganthan Narayana Samy, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N6735 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Public key infrastructure authentication framework (PKIAF) for Malaysian public sector ent://SD_ILS/0/SD_ILS:859478 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Noraida Aman Nor, 1985-, author<br/>Author&#160;Noraida Aman Nor, 1985-, author,&#160;Ganthan Narayana Samy, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034722 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART II ent://SD_ILS/0/SD_ILS:865839 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;Hassan Chizari, 1975-, contributor,&#160;Mahnoush Babaeizadeh, 1988-, contributor,&#160;Majid Bakhtiari, 1961-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S439 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835211515<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm ent://SD_ILS/0/SD_ILS:846855 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ong, Wen Jian, 1987-, author<br/>Author&#160;Ong, Wen Jian, 1987-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O54 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm ent://SD_ILS/0/SD_ILS:846857 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ong, Wen Jian, 1987-, author<br/>Author&#160;Ong, Wen Jian, 1987-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052944 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> Developing network vulnerability prediction and detection application ent://SD_ILS/0/SD_ILS:859449 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mehran Janfeshan, 1987-, author<br/>Author&#160;Mehran Janfeshan, 1987-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034751 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART 1 ent://SD_ILS/0/SD_ILS:864380 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;A. Ahmed Ibrahim Alkilary, contributor,&#160;Affandi Husain, contributor,&#160;Hassan Chizari, 1975-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S438 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;35000000012313<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:822549 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mowbray, Thomas J.<br/>Author&#160;Mowbray, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M69 2014<br/>Publisher&#160;John Wiley and Sons,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781118697115<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:822586 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Weaver, Randy, author<br/>Author&#160;Weaver, Randy, author,&#160;Weaver, Dawn, author,&#160;Farwood, Dean, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2014<br/>Edition&#160;Third edition<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781133727941<br/> Security management of next generation telecommunications networks and services ent://SD_ILS/0/SD_ILS:825733 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jacobs, Stuart<br/>Author&#160;Jacobs, Stuart<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J334 2014<br/>Publisher&#160;IEEE Press/Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780470565131<br/> Analysis of DoS attacks effects on cloud computing performance ent://SD_ILS/0/SD_ILS:825970 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmed Kadhim Noor, 1989-<br/>Author&#160;Ahmed Kadhim Noor, 1989-,&#160;Mohammad Abdur Razzaque,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A46 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831021 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author,&#160;Mazdak Zamani, 1979-, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 B35 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831022 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 033623 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:831239 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C934 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166813<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:831415 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O75 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031713<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:833094 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Middleton, Bruce, 1953-, author<br/>Author&#160;Middleton, Bruce, 1953-, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M53 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781482206470<br/> A cloud security audit quality model for a commercial bank in Malaysia ent://SD_ILS/0/SD_ILS:843871 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mariana Md. Hashim, 1982-, author<br/>Author&#160;Mariana Md. Hashim, 1982-, author,&#160;Mazdak Zamani, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 M375 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A cloud security audit quality model for a commercial bank in Malaysia ent://SD_ILS/0/SD_ILS:843872 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mariana Md. Hashim, 1982-, author<br/>Author&#160;Mariana Md. Hashim, 1982-, author,&#160;Mazdak Zamani, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034206 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:821152 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2014<br/>Edition&#160;6th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014&#160;2011<br/>ISBN&#160;9780133354690<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:821365 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Stapleton, J. J. (Jeffrey James)<br/>Author&#160;Stapleton, J. J. (Jeffrey James)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S84 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466592148<br/> Guidelines for improving security awareness courses in technical and vocational training corporation in Saudi Arabia ent://SD_ILS/0/SD_ILS:830981 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Almalki, Hassan Mohammed<br/>Author&#160;Almalki, Hassan Mohammed,&#160;Ganthan Narayana Samy, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A464 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Analysis of user awareness on phishing attempt among student ent://SD_ILS/0/SD_ILS:831117 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vanisri Nagalingam<br/>Author&#160;Vanisri Nagalingam,&#160;Ganthan Narayana Samy, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V36 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Analysis of user awareness on phishing attempt among student ent://SD_ILS/0/SD_ILS:831119 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vanisri Nagalingam<br/>Author&#160;Vanisri Nagalingam,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;CP 033629 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:828438 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Sanders, Chris, 1986-<br/>Author&#160;Sanders, Chris, 1986-,&#160;Smith, Jason (Adjunct associate professor), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S264 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124172081<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:837213 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Williams, Walter, author<br/>Author&#160;Williams, Walter, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5828 W55 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584020<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838388 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A535 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128007440<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Architectures and protocols for secure information technology infrastructures ent://SD_ILS/0/SD_ILS:841205 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Martinez, Antonio Ruiz, 1976-, editor<br/>Author&#160;Martinez, Antonio Ruiz, 1976-, editor,&#160;Marin-Lopez, Rafael, 1977-, editor,&#160;Garcia, Fernando Pereniguez, 1984-, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A73 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645141<br/> Network security technologies : design and applications ent://SD_ILS/0/SD_ILS:841210 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Amine, Abdelmalek, editor<br/>Author&#160;Amine, Abdelmalek, editor,&#160;Ait Mohamed, Otmane, editor,&#160;Benatallah, Boualem, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N483 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466647893<br/> Security, privacy, trust, and resource management in mobile and wireless communications ent://SD_ILS/0/SD_ILS:841264 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rawat, Danda B., 1977-, editor<br/>Author&#160;Rawat, Danda B., 1977-, editor,&#160;Bista, Bhed B., 1967-, editor,&#160;Yan, Gongjun, 1976-, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S435 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466646919<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:835918 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Basta, Alfred, author<br/>Author&#160;Basta, Alfred, author,&#160;Basta, Nadine, author,&#160;Brown, Mary, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2014<br/>Edition&#160;Second edition<br/>Publisher&#160;Course Technology, Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780840020932<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:837282 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;DeFranco, Joanna F author<br/>Author&#160;DeFranco, Joanna F author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D44 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564527<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:837944 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ligh, Michael Hale, author<br/>Author&#160;Ligh, Michael Hale, author,&#160;Case, Andrew, author,&#160;Levy, Jamie, author,&#160;Walters, Aaron, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L54 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118825099<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:838079 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Sood, Aditya K., author<br/>Author&#160;Sood, Aditya K., author,&#160;Enbody, Richard J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S66 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128006047<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:798922 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Fichera, Joe<br/>Author&#160;Fichera, Joe,&#160;Bolt, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F53 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499620<br/> Comparison of pattern matching algorithm for enhancing snort performance ent://SD_ILS/0/SD_ILS:803770 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abubakar Abdulkadir, 1982-<br/>Author&#160;Abubakar Abdulkadir, 1982-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A28 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:803817 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Tam, Kenneth<br/>Author&#160;Tam, Kenneth<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 U86 2013 a<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497473<br/> Comparison of pattern matching algorithm for enhancing snort performance ent://SD_ILS/0/SD_ILS:804104 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abubakar Abdulkadir, 1982-<br/>Author&#160;Abubakar Abdulkadir, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029927 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Security patterns in practice : designing secure architectures using software patterns ent://SD_ILS/0/SD_ILS:804174 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Fernandez, Eduardo B.<br/>Author&#160;Fernandez, Eduardo B.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F47 2013<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781119998945<br/> Information security ent://SD_ILS/0/SD_ILS:804293 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rhodes-Ousley, Mark<br/>Author&#160;Rhodes-Ousley, Mark<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R46 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071784351<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804506 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdifatah Abdirahman Abdullahi, 1986-<br/>Author&#160;Abdifatah Abdirahman Abdullahi, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804507 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdifatah Abdirahman Abdullah, 1986- author<br/>Author&#160;Abdifatah Abdirahman Abdullah, 1986- author,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 030021 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Network and information security : issues, challenges and research trends ent://SD_ILS/0/SD_ILS:805429 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Sarma, Nityananda<br/>Author&#160;Sarma, Nityananda,&#160;Bhattacharyya, Dhruba K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N484 2013<br/>Publisher&#160;Narosa Publishing House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9788184873146<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:805697 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Yang, Christopher C.<br/>Author&#160;Yang, Christopher C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I58 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047020<br/> An enhanced connectivity aware routing protocol for vehicular ad hoc networks ent://SD_ILS/0/SD_ILS:811477 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmadu Maidorawa, 1972-<br/>Author&#160;Ahmadu Maidorawa, 1972-,&#160;Kamalrulnizam Abu Bakar, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TE228.37 A36 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Anti-phishing design for phishing websites detection using classifier ensemble ent://SD_ILS/0/SD_ILS:811645 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Oluwatobi Ayodeji Akanbi, 1986- author<br/>Author&#160;Oluwatobi Ayodeji Akanbi, 1986- author,&#160;Mohd Azaini Maarof,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O48 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices ent://SD_ILS/0/SD_ILS:811703 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Parisa Naraei, 1988-<br/>Author&#160;Parisa Naraei, 1988-,&#160;Mazleena Salleh,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5668 P37 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices ent://SD_ILS/0/SD_ILS:811704 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Parisa Naraei, 1988-<br/>Author&#160;Parisa Naraei, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031193 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security management metrics in web application ent://SD_ILS/0/SD_ILS:811894 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Hafiz Abd. Rahim, 1984-<br/>Author&#160;Mohd. Hafiz Abd. Rahim, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031731 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Security risks in social media technologies : safe practices in public service applications ent://SD_ILS/0/SD_ILS:813931 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Oxley, Alan<br/>Author&#160;Oxley, Alan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O95 2013<br/>Publisher&#160;Chandos Pub.,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781843347149<br/> Cyber crime, security and digital intelligence ent://SD_ILS/0/SD_ILS:831351 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Johnson, Mark, 1959- author<br/>Author&#160;Johnson, Mark, 1959- author<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 J64 2013<br/>Publisher&#160;Gower,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781409454496&#160;9781409454502<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:805302 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bhattacharyya, Dhruba K.<br/>Author&#160;Bhattacharyya, Dhruba K.,&#160;Kalita, Jugal Kumar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B474 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466582088<br/> Web application defender's cookbook : battling hackers and protecting users ent://SD_ILS/0/SD_ILS:806507 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Barnett, Ryan C.<br/>Author&#160;Barnett, Ryan C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B377 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9781118362181<br/> An enhanced connectivity aware routing protocol for vehicular ad hoc networks ent://SD_ILS/0/SD_ILS:811480 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmadu Maidorawa, 1972-<br/>Author&#160;Ahmadu Maidorawa, 1972-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031078 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Hybrid artificial neural network and gravitational search algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:811721 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rahati, Shahdokht, 1982-<br/>Author&#160;Rahati, Shahdokht, 1982-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R347 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Hybrid artificial neural network and gravitational search algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:811722 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rahati, Shahdokht, 1982-<br/>Author&#160;Rahati, Shahdokht, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031733 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Distributed networks : intelligence, security, and applications ent://SD_ILS/0/SD_ILS:811727 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Memon, Qurban A.<br/>Author&#160;Memon, Qurban A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D5 D556 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466559578<br/> Information security management metrics in web application ent://SD_ILS/0/SD_ILS:811890 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Hafiz Abd. Rahim, 1984-<br/>Author&#160;Mohd. Hafiz Abd. Rahim, 1984-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M649 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> The practice of network security monitoring : understanding incident detection and response ent://SD_ILS/0/SD_ILS:814762 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bejtlich, Richard<br/>Author&#160;Bejtlich, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B455 2013<br/>Publisher&#160;No Starch Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781593275099<br/> The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice ent://SD_ILS/0/SD_ILS:797986 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Winterfeld, Steve<br/>Author&#160;Winterfeld, Steve,&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;U163 W56 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047372<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:828457 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C665 2013 f<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780123943972<br/> Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure ent://SD_ILS/0/SD_ILS:838059 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Knapp, Eric D. editor<br/>Author&#160;Knapp, Eric D. editor,&#160;Samani, Raj editor<br/>Format:&#160;Books<br/>Call Number&#160;TK3105 A67 2013<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499989<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840823 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034013 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Botnet traffic detection on android operating system ent://SD_ILS/0/SD_ILS:835643 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abang Abdul Rasyid Abang Yusop<br/>Author&#160;Abang Abdul Rasyid Abang Yusop,&#160;Bharanidharan Shanmugam, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A236 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Professional penetration testing ent://SD_ILS/0/SD_ILS:838310 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wilhelm, Thomas, author<br/>Author&#160;Wilhelm, Thomas, author,&#160;Neely, Matthew, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W544 2013<br/>Edition&#160;Second edition<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499934<br/> Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network ent://SD_ILS/0/SD_ILS:840842 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bojnord, Hoda Soltanian<br/>Author&#160;Bojnord, Hoda Soltanian,&#160;Teddy Mantoro,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B664 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840822 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network ent://SD_ILS/0/SD_ILS:840844 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bojnord, Hoda Soltanian<br/>Author&#160;Bojnord, Hoda Soltanian<br/>Format:&#160;Books<br/>Call Number&#160;CP 033625 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Elements for privacy policy in E-Commerce based on higher education perspective[electronic resource] ent://SD_ILS/0/SD_ILS:793186 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Afiqah Ahmad Said, 1986-<br/>Author&#160;Afiqah Ahmad Said, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028741 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/> A study on hazard risk governance framework in FSKSM UTM Skudai ent://SD_ILS/0/SD_ILS:793187 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Amalina Farhan Kamaruddin, 1985-<br/>Author&#160;Amalina Farhan Kamaruddin, 1985-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A435 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Comparative evaluation of nerual network and support vector machine in detecting simox fraud ent://SD_ILS/0/SD_ILS:793169 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdikarim Hussiein Elmi, 1987-<br/>Author&#160;Abdikarim Hussiein Elmi, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028102 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Support vector machine for solving small dataset problem ent://SD_ILS/0/SD_ILS:796399 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmad Rijal Abdul Rahman, 1985-<br/>Author&#160;Ahmad Rijal Abdul Rahman, 1985-,&#160;Zuwairie Ibrahim, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A34 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/> Support vector machine for solving imbalanced dataset problem ent://SD_ILS/0/SD_ILS:797054 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ismail Mohd. Khairuddin, 1987-<br/>Author&#160;Ismail Mohd. Khairuddin, 1987-,&#160;Zuwairie Ibrahim, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I84 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/> Support vector machine for solving imbalanced dataset problem ent://SD_ILS/0/SD_ILS:797071 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ismail Mohd. Khairuddin, 1987-<br/>Author&#160;Ismail Mohd. Khairuddin, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028699 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:797948 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Shimonski, Robert<br/>Author&#160;Shimonski, Robert,&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S55 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597495905<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:797962 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Shema, Mike<br/>Author&#160;Shema, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S545 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499514<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:801363 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M483 2012<br/>Edition&#160;7th ed.<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780071780285<br/> Greedy intersection-mode routing strategy protocol for vehicular networks ent://SD_ILS/0/SD_ILS:803767 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Author&#160;Mahmoud Ahmad Salem Al-Khasawneh, 1980-,&#160;Md. Asri Ngadi,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TE228.37 M34 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Greedy intersection-mode routing strategy protocol for vehicular networks ent://SD_ILS/0/SD_ILS:804117 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Author&#160;Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029817 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:805301 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ganguly, Debashis<br/>Author&#160;Ganguly, Debashis,&#160;Lahiri, Shibamouli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G365 2012<br/>Publisher&#160;Science Publishers ; Distributed by CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781578087556<br/> Database security ent://SD_ILS/0/SD_ILS:803713 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Basta, Alfred.<br/>Author&#160;Basta, Alfred.,&#160;Zgola, Melissa,&#160;Bullaboy, Dana<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 B37 2012<br/>Publisher&#160;Course Technology, Cengage Learning,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781435453906<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:818394 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Williams, Branden R.<br/>Author&#160;Williams, Branden R.,&#160;Chuvakin, Anton<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P35 2012<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499484<br/> ARP poisoning detection and protection using client's ARP table monitoring ent://SD_ILS/0/SD_ILS:778233 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Navid Behboodian, 1986-<br/>Author&#160;Navid Behboodian, 1986-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N38 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> ARP poisoning detection and protection using client's ARP table monitoring ent://SD_ILS/0/SD_ILS:778234 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Navid Behboodian, 1986-<br/>Author&#160;Navid Behboodian, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027522 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security awareness framework of mobile phones from users' perspective ent://SD_ILS/0/SD_ILS:778415 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Author&#160;Mohamed Hagi Abdulkadir, 1985-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 M644 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security awareness framework of mobile phones from users' perspective ent://SD_ILS/0/SD_ILS:778416 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Author&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027523 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Secure document workflow for paper reviewing system ent://SD_ILS/0/SD_ILS:787807 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Lee, San Chin, 1988-<br/>Author&#160;Lee, San Chin, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027602 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Security features identification for CISCO routers ent://SD_ILS/0/SD_ILS:790284 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Foroozesh, Behnaz, 1981-<br/>Author&#160;Foroozesh, Behnaz, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027549 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) &ndash; Universiti Teknologi Malaysia, 2012<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:797984 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Clarke, Justin<br/>Author&#160;Clarke, Justin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C542 2012<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499637<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:798633 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Speed, Tyler Justin<br/>Author&#160;Speed, Tyler Justin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S643 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439809822<br/> Cyber security standards, practices and industrial applications : systems and methodologies ent://SD_ILS/0/SD_ILS:772975 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Author&#160;Zubairi, Junaid Ahmed, 1961-,&#160;Mahboob, Athar, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C93 2012 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781609608514&#160;9781609608521&#160;9781609608538<br/> Enhancing EAP-TLS authentication protocol for IEEE 802.11i ent://SD_ILS/0/SD_ILS:778431 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bahareh Shojaie, 1984-<br/>Author&#160;Bahareh Shojaie, 1984-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5668 B34 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Enhancing EAP-TLS authentication protocol for IEEE 802.11i ent://SD_ILS/0/SD_ILS:778434 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bahareh Shojaie, 1984-<br/>Author&#160;Bahareh Shojaie, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027778 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness level framework to assess bank employees : Maybank Taman Universiti case study ent://SD_ILS/0/SD_ILS:786341 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Author&#160;Bassem Gamal Hanash Qasem, 1984-,&#160;Imran Ghani, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B375 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness level framework to assess bank employees Maybank Taman Universiti case study ent://SD_ILS/0/SD_ILS:786344 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Author&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028279 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Secure document workflow for paper reviewing system ent://SD_ILS/0/SD_ILS:787798 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Lee, San Chin, 1988-<br/>Author&#160;Lee, San Chin, 1988-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L44 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Security features identification for CISCO routers ent://SD_ILS/0/SD_ILS:790282 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Foroozesh, Behnaz, 1981-<br/>Author&#160;Foroozesh, Behnaz, 1981-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8.C57 F67 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Elements for privacy policy in E-Commerce based on higher education perspective ent://SD_ILS/0/SD_ILS:793175 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Afiqah Ahmad Said, 1986-<br/>Author&#160;Afiqah Ahmad Said, 1986-,&#160;Ab. Razak Che Hussin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A354 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/> A study on hazard risk governance framework in FSKSM UTM Skudai ent://SD_ILS/0/SD_ILS:793188 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Amalina Farhan Kamaruddin, 1985-<br/>Author&#160;Amalina Farhan Kamaruddin, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028119 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Comparative evaluation of nerual network and support vector machine in detecting simox fraud ent://SD_ILS/0/SD_ILS:793166 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdikarim Hussiein Elmi, 1987-<br/>Author&#160;Abdikarim Hussiein Elmi, 1987-,&#160;Subariah Ibrahim,&#160;Roselina Salleh @ Sallehuddin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A235 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Support vector machine for solving small dataset problem ent://SD_ILS/0/SD_ILS:796400 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmad Rijal Abdul Rahman, 1985-<br/>Author&#160;Ahmad Rijal Abdul Rahman, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028613 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836518 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Principles of information security ent://SD_ILS/0/SD_ILS:838004 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W34 2012<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781111138219<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836519 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034114 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security risk management : building an information security risk management program from the ground up ent://SD_ILS/0/SD_ILS:735827 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wheeler, Evan<br/>Author&#160;Wheeler, Evan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W48 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496155<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:748817 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Winkler, J. R. (Joachim R.)<br/>Author&#160;Winkler, J. R. (Joachim R.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 W56 2011<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495929<br/> Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRS ent://SD_ILS/0/SD_ILS:765341 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Nur Farhana Jalalluddin<br/>Author&#160;Nur Farhana Jalalluddin<br/>Format:&#160;Books<br/>Call Number&#160;CP 026419 ra<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Windows registry forensics advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:813367 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Carvey, Harlan<br/>Author&#160;Carvey, Harlan<br/>Format:&#160;Books<br/>Call Number&#160;CP 030880<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:643191 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Scambray, Joel<br/>Author&#160;Scambray, Joel,&#160;Liu, Vincent,&#160;Sima, Caleb<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S324 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill Companies,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071740647<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:730069 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Tiller, James S.<br/>Author&#160;Tiller, James S.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T553 2011<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780849370526<br/> Physical-layer security : from information theory to security engineering ent://SD_ILS/0/SD_ILS:802330 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bloch, Matthieu, 1981-<br/>Author&#160;Bloch, Matthieu, 1981-,&#160;Barros, Joao<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B574 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521516501<br/> Network security : a decision and game-theoretic approach ent://SD_ILS/0/SD_ILS:811760 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Alpcan, Tansu, 1975-<br/>Author&#160;Alpcan, Tansu, 1975-,&#160;Basar, Tamer<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A47 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521119320<br/> Cognitive radio networking and security : a game-theoretic view ent://SD_ILS/0/SD_ILS:761273 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Liu, K. J. Ray, 1961-<br/>Author&#160;Liu, K. J. Ray, 1961-,&#160;Wang, Beibei<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4815 L58 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521762311<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:761290 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Davis, Chris (Christopher Michael)<br/>Author&#160;Davis, Chris (Christopher Michael),&#160;Schiller, Mike,&#160;Wheeler, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A93 D38 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071742382<br/> Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRS ent://SD_ILS/0/SD_ILS:765338 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Nur Farhana Jalalluddin<br/>Author&#160;Nur Farhana Jalalluddin,&#160;Syed Othmawi Abd. Rahman,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N43 2011 raf<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> An adaptive intrusion detection model for dynamic network traffic patterns using machine learning techniques ent://SD_ILS/0/SD_ILS:770801 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Anazida Zainal, 1967-<br/>Author&#160;Anazida Zainal, 1967-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Siti Mariyam Shamsuddin, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A53 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> An adaptive intrusion detection model for dynamic network traffic patterns using machine learning techniques ent://SD_ILS/0/SD_ILS:772309 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Anazida Zainal, 1967-<br/>Author&#160;Anazida Zainal, 1967-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Siti Mariyam Shamsuddin, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 025846 ra<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:758256 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2011<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136097044<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:758605 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Rudolph, K.,&#160;Tittel, Ed.,&#160;Broom, Neil,&#160;Barrett, Diane<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S656 2011<br/>Edition&#160;Second edition.<br/>Publisher&#160;Wiley Publishing, Inc.<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470931660<br/> Implementing SSL/TLS using cryptography and PKI ent://SD_ILS/0/SD_ILS:758609 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Davies, Joshua<br/>Author&#160;Davies, Joshua<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D38 2011<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470920411<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:758726 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Carvey, Harlan A.<br/>Author&#160;Carvey, Harlan A.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C373 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> Roadmap to information security : for IT and InfoSec managers ent://SD_ILS/0/SD_ILS:781102 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2011<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781435480308<br/> Introduction to security and network forensics ent://SD_ILS/0/SD_ILS:785073 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Buchanan, William J.<br/>Author&#160;Buchanan, William J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B824 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780849335686<br/> Intrusion detection : a machine learning approach ent://SD_ILS/0/SD_ILS:780736 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Yu, Zhenwei<br/>Author&#160;Yu, Zhenwei,&#160;Tsai, Jeffrey J. P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y89 2011<br/>Publisher&#160;Imperial College Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781848164475<br/> Analysis issues of computer network security management for disposable dishes companies in Iran ent://SD_ILS/0/SD_ILS:837885 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Fatemeh Honarjoo<br/>Author&#160;Fatemeh Honarjoo<br/>Format:&#160;Books<br/>Call Number&#160;CP 034161 ra<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:377761 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S72 2011<br/>Edition&#160;4th ed.<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136108054<br/> Analysis and detection of P2P botnet based on node behaviour ent://SD_ILS/0/SD_ILS:835995 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammad Reza Rostami<br/>Author&#160;Mohammad Reza Rostami,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6436 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Analysis issues of computer network security management for disposable dishes companies in Iran ent://SD_ILS/0/SD_ILS:837884 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Fatemeh Honarjoo<br/>Author&#160;Fatemeh Honarjoo,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F38 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838401 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason,&#160;Rogers, Russ, editor<br/>Format:&#160;Computer file<br/>Call Number&#160;QA76.9.A25 A535 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496537<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:603479 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017398 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Analysis and implementation of security algorithms for wireless communications ent://SD_ILS/0/SD_ILS:604109 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdinasir Hassan Ali, 1977-<br/>Author&#160;Abdinasir Hassan Ali, 1977-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 020848 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Detecting plaintext recovery attack in secure shell (SSH) ent://SD_ILS/0/SD_ILS:604110 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025106 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamaatn maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Web services security development and architecture : theoretical and practical issues ent://SD_ILS/0/SD_ILS:630418 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Gutierrez, Carlos, 1977-<br/>Author&#160;Gutierrez, Carlos, 1977-,&#160;Fernandez-Medina, Eduardo, 1973-,&#160;Piattini, Mario, 1966-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.88813 W427 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605669502&#160;9781605669519<br/> Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:640462 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Lillard, Terrence V.<br/>Author&#160;Lillard, Terrence V.,&#160;Lillard, Terrence<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D54 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495370<br/> Improving corporate governance through ICT risk management ent://SD_ILS/0/SD_ILS:731727 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bekzat Kalkabay, 1984-<br/>Author&#160;Bekzat Kalkabay, 1984-,&#160;Harihodin Selamat,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B454 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/> Improving corporate governance through ICT risk management ent://SD_ILS/0/SD_ILS:731728 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bekzat Kalkabay, 1984-<br/>Author&#160;Bekzat Kalkabay, 1984-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 023675 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/> Professional penetration testing : creating and operating a formal hacking lab ent://SD_ILS/0/SD_ILS:748814 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wilhelm, Thomas<br/>Author&#160;Wilhelm, Thomas,&#160;Kanclirz, Jan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W544 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597494250<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:767662 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Johnson, Robert, 1946-<br/>Author&#160;Johnson, Robert, 1946-,&#160;Merkow, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2010<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763791322<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:804270 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P445 2010<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439839560<br/> A hybrid intelligent intrusion detection system using fuzzy logic and improved packet tracing model ent://SD_ILS/0/SD_ILS:626268 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bharanidharan Shanmugam<br/>Author&#160;Bharanidharan Shanmugam,&#160;Norbik Bashah Idris,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B42 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> A hybrid intelligent intrusion detection system using fuzzy logic and improved packet tracing model ent://SD_ILS/0/SD_ILS:626269 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bharanidharan Shanmugam<br/>Author&#160;Bharanidharan Shanmugam,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 019660 ra<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> Hybrid detection technique for databases intrusion using SQL injection and insider misuse data ent://SD_ILS/0/SD_ILS:731307 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Aziah Asmawi, 1981-<br/>Author&#160;Aziah Asmawi, 1981-,&#160;Zailani Mohamed Sidek, supervisor,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A95 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Hybrid detection technique for databases intrusion using SQL injection and insider misuse data ent://SD_ILS/0/SD_ILS:731308 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Aziah Asmawi, 1981-<br/>Author&#160;Aziah Asmawi, 1981-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 024288 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Seven deadliest web application attacks ent://SD_ILS/0/SD_ILS:758893 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Shema, Mike<br/>Author&#160;Shema, Mike,&#160;Ely, Adam<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S544 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495431<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:758898 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Timm, Carl<br/>Author&#160;Timm, Carl,&#160;Perez, Richard, 1969-,&#160;Ely, Adam<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.88817 T56 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495455<br/> A comparative study of K-Means and self organizing map (SOM) in intrusion detection ent://SD_ILS/0/SD_ILS:759332 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wan Sharina Wan Ramli, 1987-<br/>Author&#160;Wan Sharina Wan Ramli, 1987-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W367 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> A comparative study of k-means and self organizing map (SOM) in intrusion detection ent://SD_ILS/0/SD_ILS:759334 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wan Sharina Wan Ramli, 1987-<br/>Author&#160;Wan Sharina Wan Ramli, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 026345 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMS ent://SD_ILS/0/SD_ILS:759402 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Azzaharul Hamdi Abdul Aziz<br/>Author&#160;Azzaharul Hamdi Abdul Aziz,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A99 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Airline special service request (SSR) passengers tracking system using RFID ent://SD_ILS/0/SD_ILS:759492 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Foo, Yong Jing, 1987-<br/>Author&#160;Foo, Yong Jing, 1987-,&#160;Hazinah Kutty Mammi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F66 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Airline special service request (SSR) passengers tracking system using RFID ent://SD_ILS/0/SD_ILS:759493 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Foo, Yong Jing, 1987-<br/>Author&#160;Foo, Yong Jing, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 024836 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Registry protector : pengesanan pengubahan registry serta pemulihannya ent://SD_ILS/0/SD_ILS:759629 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mak, Weng Hong<br/>Author&#160;Mak, Weng Hong,&#160;Abd. Bahrim Yusoff,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M354 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Permodelan prestasi GSM/GPRS terhadap kepelbagaian kelas trafik menggunakan kaedah pengumpukkan saluran CPS ent://SD_ILS/0/SD_ILS:759741 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wan Nurul Farah Izyana Wan Hanafi<br/>Author&#160;Wan Nurul Farah Izyana Wan Hanafi,&#160;Syed Othmawi Abd. Rahman,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W58 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Permodelan prestasi GSM/GPRS terhadap kepelbagaian kelas trafik menggunakan kaedah pengumpukkan saluran CPS ent://SD_ILS/0/SD_ILS:759743 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wan Nurul Farah Izyana Wan Hanafi<br/>Author&#160;Wan Nurul Farah Izyana Wan Hanafi<br/>Format:&#160;Books<br/>Call Number&#160;CP 026380 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Secure file transfer system (SFTS) ent://SD_ILS/0/SD_ILS:759875 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Tan, Chiaw Wei<br/>Author&#160;Tan, Chiaw Wei,&#160;Hazinah Kutty Mammi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T367 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Secure file transfer system (SFTS) ent://SD_ILS/0/SD_ILS:759876 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Tan, Chiaw Wei<br/>Author&#160;Tan, Chiaw Wei<br/>Format:&#160;Books<br/>Call Number&#160;CP 026659 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:761026 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Barrett, Diane,&#160;Broom, Nell<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S657 2010<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470936122<br/> Firewall design and analysis /cAlex X. Liu ent://SD_ILS/0/SD_ILS:764064 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Liu, Alex X.<br/>Author&#160;Liu, Alex X.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L57 2011<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2010<br/>ISBN&#160;9789814261654<br/> Automated signature generation of network attacks ent://SD_ILS/0/SD_ILS:764813 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd Farhan Yusof, 1986-<br/>Author&#160;Mohd Farhan Yusof, 1986-,&#160;Muhammad Nadzir Marsono,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;XX(764813.1)<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Bimodal recognition based on thumbprint and thumb image using bayesian classfier ent://SD_ILS/0/SD_ILS:770265 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Low, Zhi Wei, 1982-<br/>Author&#160;Low, Zhi Wei, 1982-,&#160;Syed Abdul Rahman Al-Attas, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L69 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2010<br/> Bimodal recognition based on thumbprint and thumb image using bayesian classfier ent://SD_ILS/0/SD_ILS:770266 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Low, Zhi Wei, 1982-<br/>Author&#160;Low, Zhi Wei, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 024776 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2010<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:782581 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Barrett, Diane,&#160;Broom, Nell<br/>Format:&#160;Books<br/>Call Number&#160;CP 026529<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2010<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:758900 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Prowell, Stacy J.<br/>Author&#160;Prowell, Stacy J.,&#160;Kraus, Rob,&#160;Borkin, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P76 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495493<br/> Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMS ent://SD_ILS/0/SD_ILS:759406 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Azzaharul Hamdi Abdul Aziz<br/>Author&#160;Azzaharul Hamdi Abdul Aziz<br/>Format:&#160;Books<br/>Call Number&#160;CP 024809 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Registry protector : pengesanan pengubahan registry serta pemulihannya ent://SD_ILS/0/SD_ILS:759633 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mak, Weng Hong<br/>Author&#160;Mak, Weng Hong<br/>Format:&#160;Books<br/>Call Number&#160;CP 024838 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Analysis of wired network security facilities in securing wireless network ent://SD_ILS/0/SD_ILS:836160 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdul Kadir Ali Husein<br/>Author&#160;Abdul Kadir Ali Husein,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 A238 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Makumat)) - Universiti Teknologi Malaysia, 2010<br/> A network security policy for the faculty of engineering-University of Aden ent://SD_ILS/0/SD_ILS:840556 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammed, Hani Mohammed Abdo<br/>Author&#160;Mohammed, Hani Mohammed Abdo,&#160;Raja Baharuddin Anom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M646 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Detection technique using correlation of network flows for IDS ent://SD_ILS/0/SD_ILS:840567 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Amoli, Payam Vahdani, 1986-<br/>Author&#160;Amoli, Payam Vahdani, 1986-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A466 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Detection technique using correlation of network flows for IDS ent://SD_ILS/0/SD_ILS:840568 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Amoli, Payam Vahdani, 1986-<br/>Author&#160;Amoli, Payam Vahdani, 1986-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 033994 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Anomaly intrusion detection system using immune network with reduced network traffic features ent://SD_ILS/0/SD_ILS:603472 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Murad Abdo Rassam Qasem, 1980-<br/>Author&#160;Murad Abdo Rassam Qasem, 1980-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 022926 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Awareness and acceptance analysis of information security policy ent://SD_ILS/0/SD_ILS:604060 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Zuki Muda, 1968-<br/>Author&#160;Mohd. Zuki Muda, 1968-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 026661 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamatan maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Analysis and effectiveness of signature based in detecting metamorphic virus ent://SD_ILS/0/SD_ILS:604063 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Syahrizal Azmir Md.Sharif, 1983-<br/>Author&#160;Syahrizal Azmir Md.Sharif, 1983-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 027177 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> A study of trusted computing implementation in public sector information, communication and technology (ICT) domain ent://SD_ILS/0/SD_ILS:604073 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rusnita Isnin @ Hamdan<br/>Author&#160;Rusnita Isnin @ Hamdan,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025045 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> 24 deadly sins of software security : programming flaws and how to fix them ent://SD_ILS/0/SD_ILS:387540 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Howard, Michael<br/>Author&#160;Howard, Michael,&#160;LeBlanc, David, 1960-,&#160;Viega, John<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 2010<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071626750<br/> Awareness and acceptance analysis of information security policy ent://SD_ILS/0/SD_ILS:396389 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Zuki Muda, 1968-<br/>Author&#160;Mohd. Zuki Muda, 1968-,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M984 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Fast flux service networks detection model ent://SD_ILS/0/SD_ILS:396407 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Zaim Salleh, 1979-<br/>Author&#160;Mohd. Zaim Salleh, 1979-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M93 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> A study of trusted computing implementation in public sector information, communication and technology (ICT) domain ent://SD_ILS/0/SD_ILS:396440 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Rusnita Isnin @ Hamdan<br/>Author&#160;Rusnita Isnin @ Hamdan,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R87 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Botnet detection by monitoring common network behaviors ent://SD_ILS/0/SD_ILS:396448 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hossein Rouhani Zeidanloo, 1982-<br/>Author&#160;Hossein Rouhani Zeidanloo, 1982-,&#160;Azizah Abdul Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H67 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Non technical approach to multi layered network security against malware ent://SD_ILS/0/SD_ILS:396475 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Christine Simfukwe, 1973-<br/>Author&#160;Christine Simfukwe, 1973-,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C474 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> A network security management approach for WLAN ent://SD_ILS/0/SD_ILS:396655 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Maziar Janbeglou, 1981-<br/>Author&#160;Maziar Janbeglou, 1981-,&#160;Suhaimi Ibrahim, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M394 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/> Analysis and implementation of security algorithms for wireless communications ent://SD_ILS/0/SD_ILS:396710 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Abdinasir Hassan Ali, 1977-<br/>Author&#160;Abdinasir Hassan Ali, 1977-,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A22 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Analysis and effectiveness of signature based in detecting metamorphic virus ent://SD_ILS/0/SD_ILS:396400 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Syahrizal Azmir Md.Sharif, 1983-<br/>Author&#160;Syahrizal Azmir Md.Sharif, 1983-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S934 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Detecting plaintext recovery attack in secure shell (SSH) ent://SD_ILS/0/SD_ILS:396717 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author&#160;Zaid Mujaiyid Putra Ahmad Baidowi, 1980-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z35 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Anomaly intrusion detection system using immune network with reduced network traffic features ent://SD_ILS/0/SD_ILS:390582 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Murad Abdo Rassam Qasem, 1980-<br/>Author&#160;Murad Abdo Rassam Qasem, 1980-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Anazida Zainal, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M87 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:390590 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Abdul Hanan Abdullah,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M325 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Network intrusion detection and prevention : concepts and techniques ent://SD_ILS/0/SD_ILS:334955 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ali A. Ghorbani<br/>Author&#160;Ali A. Ghorbani,&#160;Lu, Wei,&#160;Tavallaee, Mahbod<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A43 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387887708<br/> Improving a multi-factor authentication using multiple graphical password and PDA ent://SD_ILS/0/SD_ILS:836194 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jalal Mawlud H.Bradi<br/>Author&#160;Jalal Mawlud H.Bradi,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J353 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Improving a multi-factor authentication using multiple graphical password and PDA ent://SD_ILS/0/SD_ILS:836195 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jalal Mawlud H.Bradi<br/>Author&#160;Jalal Mawlud H.Bradi<br/>Format:&#160;Books<br/>Call Number&#160;CP 034158 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardware ent://SD_ILS/0/SD_ILS:363856 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vishnu Paramasivam, 1984-<br/>Author&#160;Vishnu Paramasivam, 1984-,&#160;Mohamed Khalil Mohd. Hani, supervisor,&#160;Muhammad Mun'im Ahmad Zabidi, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V574 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2009<br/> Development of security in wireless network using IPv6 ent://SD_ILS/0/SD_ILS:379024 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vikneswary Jayapal, 1982-<br/>Author&#160;Vikneswary Jayapal, 1982-,&#160;Sharifah Hafizah Syed Ariffin, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7872.D48 V55 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan Elektrik(Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia,2009<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:602804 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ciampa, Mark<br/>Author&#160;Ciampa, Mark<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016690<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2009<br/> SSL and TLS : theory and practice ent://SD_ILS/0/SD_ILS:627904 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O67 2009<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781596934474<br/> Socioeconomic and legal implications of electronic intrusion ent://SD_ILS/0/SD_ILS:631936 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Politis, Dionysios<br/>Author&#160;Politis, Dionysios,&#160;Kozyris, Phaedon J. (Phaedon John),&#160;Iglezakis, Ioannis, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 S634 2009 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781605662046&#160;9781605662053<br/> Cisco ASA Configuration ent://SD_ILS/0/SD_ILS:621980 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Deal, Richard<br/>Author&#160;Deal, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D429 2009<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780071622691<br/> Authentication study and implementation using IPSEC and IEEE 802.1X technology ent://SD_ILS/0/SD_ILS:590582 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmed Omar Al-Amodi, 1984-<br/>Author&#160;Ahmed Omar Al-Amodi, 1984-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019818 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardware ent://SD_ILS/0/SD_ILS:598173 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vishnu Paramasivam, 1984-<br/>Author&#160;Vishnu Paramasivam, 1984-,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019219 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2009<br/> Prototype development for embedding large amount of information using secure LSB and neural based steganography ent://SD_ILS/0/SD_ILS:590579 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Basam N. Saleh<br/>Author&#160;Basam N. Saleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017327 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Study of secure firewall filtering mechanism for network security ent://SD_ILS/0/SD_ILS:601101 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammed Mustafa Mohammed<br/>Author&#160;Mohammed Mustafa Mohammed,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 026228 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2009<br/> Development of security in wireless network using IPv6 ent://SD_ILS/0/SD_ILS:601971 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Vikneswary Jayapal, 1982-<br/>Author&#160;Vikneswary Jayapal, 1982-,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 023107 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan Elektrik(Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia,2009<br/> Next generation SSH2 implementation : securing data in motion ent://SD_ILS/0/SD_ILS:282024 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Liu, Dale<br/>Author&#160;Liu, Dale<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L58 2009<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597492836<br/> Security of information and communication networks ent://SD_ILS/0/SD_ILS:282111 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Kartalopoulos, Stamatios V.<br/>Author&#160;Kartalopoulos, Stamatios V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K37 2009<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470290255<br/> Hacking exposed 6 : network security secrets and solutions ent://SD_ILS/0/SD_ILS:287480 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M325 2009<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780071613743<br/> Security in wireless mesh networks ent://SD_ILS/0/SD_ILS:297556 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zhang, Yan<br/>Author&#160;Zhang, Yan,&#160;Zheng, Jun,&#160;Hu, Honglin, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S44 2009<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780849382505<br/> SIP security ent://SD_ILS/0/SD_ILS:300346 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Sisalem, Dorgham<br/>Author&#160;Sisalem, Dorgham<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S56 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470516362<br/> Study of secure firewall filtering mechanism for network security ent://SD_ILS/0/SD_ILS:371803 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammed Mustafa Mohammed<br/>Author&#160;Mohammed Mustafa Mohammed,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M68 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2009<br/> Prototype development for embedding large amount of information using secure LSB and neural based steganography ent://SD_ILS/0/SD_ILS:322525 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Basam N. Saleh<br/>Author&#160;Basam N. Saleh,&#160;Azizah Abd. Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B374 2009 raf<br/>Publication Date&#160;2009<br/><a href="http://eprints.utm.my/9764">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Architecting secure software systems ent://SD_ILS/0/SD_ILS:328716 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Talukder, Asoke K.<br/>Author&#160;Talukder, Asoke K.,&#160;Chaitanya, Manish<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T33 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420087840<br/> Security software development : assessing and managing security risks ent://SD_ILS/0/SD_ILS:319416 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ashbaugh, Douglas A.<br/>Author&#160;Ashbaugh, Douglas A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A84 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420063806<br/> Authentication study and implementation using IPSEC and IEEE 802.1X technology ent://SD_ILS/0/SD_ILS:322542 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ahmed Omar Al-Amodi, 1984-<br/>Author&#160;Ahmed Omar Al-Amodi, 1984-,&#160;Zailani Mohamed Sidek, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A55 2009 raf<br/>Publication Date&#160;2009<br/><a href="http://eprints.utm.my/5147">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> IPv6 security ent://SD_ILS/0/SD_ILS:328225 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hogg, Scott<br/>Author&#160;Hogg, Scott,&#160;Vyncke, Eric<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H634 2009<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781587055942<br/> Cisco secure firewall services module (FWSM) ent://SD_ILS/0/SD_ILS:328207 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Blair, Ray, 1965-<br/>Author&#160;Blair, Ray, 1965-,&#160;Durai, Arvind<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B52 2009<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781587053535<br/> Security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:334739 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ciampa, Mark<br/>Author&#160;Ciampa, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C524 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781428340664<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Network security bible ent://SD_ILS/0/SD_ILS:333037 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Cole, Eric<br/>Author&#160;Cole, Eric,&#160;Krutz, Ronald L., 1938-,&#160;Conley, James W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C645 2009<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470502495&#160;9780764573972<br/> Introduction to network security ent://SD_ILS/0/SD_ILS:334687 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Jacobson, Douglas<br/>Author&#160;Jacobson, Douglas<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J32 2009<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781584885436<br/> Statistical techniques for network security : modern statistically-based intrusion detection and protection ent://SD_ILS/0/SD_ILS:334973 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Wang, Yun<br/>Author&#160;Wang, Yun<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W364 2009<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599047089<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:339599 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Minoli, Daniel<br/>Author&#160;Minoli, Daniel,&#160;Kouns, Jake<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M56 2009<br/>Publisher&#160;Auerbach Publication,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420092295<br/> Principles of information security ent://SD_ILS/0/SD_ILS:252460 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W444 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781423901778<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:232208 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Author&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H63 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing ent://SD_ILS/0/SD_ILS:210780 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Buttyan, Levente<br/>Author&#160;Buttyan, Levente,&#160;Hubaux, Jean-Pierre<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 B87 2008<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780521873710<br/> Network-aware security for group communications ent://SD_ILS/0/SD_ILS:225886 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Sun, Yan (Yan Lindsay)<br/>Author&#160;Sun, Yan (Yan Lindsay),&#160;Trappe, Wade,&#160;Liu, K. J. Ray, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S86 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387688466<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:232187 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Zou, Xukai, 1963-<br/>Author&#160;Zou, Xukai, 1963-,&#160;Dai, Yuan-Shun,&#160;Pan, Yi, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z68 2008<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789812703682<br/> Cisco ASA, PIX and FWSM firewall handbook ent://SD_ILS/0/SD_ILS:245433 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hucaby, David<br/>Author&#160;Hucaby, David,&#160;Hucaby, Dave<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H84 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781587054570<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:245646 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Basta, Alfred<br/>Author&#160;Basta, Alfred,&#160;Halton, Wolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2008<br/>Publisher&#160;Thomson,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418048266<br/> Web 2.0 security : defending AJAX, RIA and SOA ent://SD_ILS/0/SD_ILS:249343 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Shah, Shreeraj<br/>Author&#160;Shah, Shreeraj<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S53 2008<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584505501<br/> An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacks ent://SD_ILS/0/SD_ILS:379917 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Yazid Idris, 1973-<br/>Author&#160;Mohd. Yazid Idris, 1973-,&#160;Abdul Hanan Abdullah,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M924 2008 raf<br/>Publication Date&#160;2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/> Securing the information infrastructure ent://SD_ILS/0/SD_ILS:631867 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Kizza, Joseph Migga<br/>Author&#160;Kizza, Joseph Migga,&#160;Kizza, Florence Migga<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 K59 2008<br/>Publisher&#160;Cybertech Pub.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599043791&#160;9781599043814<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:592521 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016065<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418067335<br/> Hybrid fuzzy techniques for unsupervised intrusion detection system ent://SD_ILS/0/SD_ILS:583651 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Witcha Chimphlee<br/>Author&#160;Witcha Chimphlee,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017104 ra<br/>Publication Date&#160;2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/> Analysis of an intrusion detection system based on immunilogy ent://SD_ILS/0/SD_ILS:586099 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammed Hussein Saeed Al-Amoudi<br/>Author&#160;Mohammed Hussein Saeed Al-Amoudi<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017191 ra<br/>Publication Date&#160;2008<br/><a href="http://eprints.utm.my/9502">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:588292 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016838<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008&#160;20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Analysis on network reconnaisance activities using unsupervised learning approach ent://SD_ILS/0/SD_ILS:588299 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohamad Nizam Khalid<br/>Author&#160;Mohamad Nizam Khalid,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019560 ra<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> SUSE linux enterprise server security (cource 3075) : SLES to VMWere server student manual (PDF) self-study wookbook (PDF) self study files ent://SD_ILS/0/SD_ILS:589690 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Eckert, Jason W.<br/>Author&#160;Eckert, Jason W.,&#160;Novell, Inc.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015660<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781428322233<br/> SUSE linux enterprise server security (cource 3075) : Suse Linux Enterprise Server 10 ent://SD_ILS/0/SD_ILS:589691 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Eckert, Jason W.<br/>Author&#160;Eckert, Jason W.,&#160;Novell, Inc.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 014659<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781428322233<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:589735 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hay, Andrew<br/>Author&#160;Hay, Andrew,&#160;Cid, Daniel,&#160;Bray, Rory<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015751<br/>Publisher&#160;Syngress Publishing Inc.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492409<br/> Hand vein feature extraction system ent://SD_ILS/0/SD_ILS:590014 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ooi, Joo Guan, 1974-<br/>Author&#160;Ooi, Joo Guan, 1974-,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 031230 ra<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2008<br/> An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacks ent://SD_ILS/0/SD_ILS:602138 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohd. Yazid Idris, 1973-<br/>Author&#160;Mohd. Yazid Idris, 1973-,&#160;Abdul Hanan Abdullah,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017038 ra<br/>Publication Date&#160;2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Mastering system center data protection manager 2007 ent://SD_ILS/0/SD_ILS:286619 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ganger, Devin L.<br/>Author&#160;Ganger, Devin L.,&#160;Femling, Ryan, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G36 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470181522<br/> Hacking exposed web 2.0 : web 2.0 security secrets and solutions ent://SD_ILS/0/SD_ILS:290409 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Cannings, Rich<br/>Author&#160;Cannings, Rich,&#160;Dwivedi, Himanshu,&#160;Lackey, Zane<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C36 2008<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780071494618<br/> Analysis of an intrusion detection system based on immunilogy ent://SD_ILS/0/SD_ILS:291103 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohammed Hussein Saeed Al-Amoudi<br/>Author&#160;Mohammed Hussein Saeed Al-Amoudi,&#160;Norbik Bashah Idris<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M6342 2008 raf<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:292712 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hoffman, Daniel V.<br/>Author&#160;Hoffman, Daniel V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H64 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:300381 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Poisel, Richard A.<br/>Author&#160;Poisel, Richard A.<br/>Format:&#160;Books<br/>Call Number&#160;UG590 P64 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596934528<br/> Information security : a practical approach ent://SD_ILS/0/SD_ILS:349781 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bhaskar, S. M.<br/>Author&#160;Bhaskar, S. M.,&#160;Ahson, S. I.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.6.A25 B52 2008<br/>Publisher&#160;Alpha Science Intl Ltd,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781842654583<br/> Digital privacy : theory, technologies and practices ent://SD_ILS/0/SD_ILS:248071 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Acquisti, Alessandro<br/>Author&#160;Acquisti, Alessandro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D58 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008&#160;2007<br/>ISBN&#160;9781420052176<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:248086 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Qian, Yi, 1962-<br/>Author&#160;Qian, Yi, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I58 2008<br/>Publisher&#160;Elsevier/Morgan Kaufmann,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780123735669<br/> Software security engineering : a guide for project managers ent://SD_ILS/0/SD_ILS:262077 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Allen, Julia H.<br/>Author&#160;Allen, Julia H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S535 2008<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321509178<br/> Router security strategies : securing IP network traffic planes ent://SD_ILS/0/SD_ILS:272274 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Schudel, Gregg<br/>Author&#160;Schudel, Gregg,&#160;Smith, David J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.543 S38 2007<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781587053368<br/> The craft of system security ent://SD_ILS/0/SD_ILS:272348 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Smith, Sean<br/>Author&#160;Smith, Sean,&#160;Marchesini, John<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S65 2008<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321434838<br/> OSSEC host-based intrusion detection guide ent://SD_ILS/0/SD_ILS:281392 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hay, Andrew<br/>Author&#160;Hay, Andrew,&#160;Cid, Daniel,&#160;Bray, Rory<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H39 2008<br/>Publisher&#160;Syngress Publishing Inc.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492409<br/> Secure computer and network systems : modeling, analysis and design ent://SD_ILS/0/SD_ILS:286763 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ye, Nong<br/>Author&#160;Ye, Nong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y464 2008<br/>Publisher&#160;Hoboken, NJ : J. Wiley &amp; Sons,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470023242<br/> Hybrid fuzzy techniques for unsupervised intrusion detection system ent://SD_ILS/0/SD_ILS:266356 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Witcha Chimphlee<br/>Author&#160;Witcha Chimphlee,&#160;Abdul Hanan Abdullah,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W87 2008 raf<br/>Publication Date&#160;2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/> SUSE linux enterprise server security ent://SD_ILS/0/SD_ILS:269067 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Eckert, Jason W.<br/>Author&#160;Eckert, Jason W.,&#160;Novell, Inc.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E24 2008<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781428322233<br/> Implementing 802.1X security solutions for wired and wireless networks ent://SD_ILS/0/SD_ILS:272330 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Geier, James T.<br/>Author&#160;Geier, James T.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G44 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470168608<br/> End-to-end network security : defense-in-depth ent://SD_ILS/0/SD_ILS:272354 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Santos, Omar<br/>Author&#160;Santos, Omar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S33 2007<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781587053320<br/> Intrusion detection systems ent://SD_ILS/0/SD_ILS:332294 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Di Pietro, Robert<br/>Author&#160;Di Pietro, Robert,&#160;Mancini, Luigi V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I56 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387772653<br/> Guide to firewalls and network security ent://SD_ILS/0/SD_ILS:340822 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G84 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781435420168<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:353804 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2008<br/>Edition&#160;2nd ed.,<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070648234<br/> Web 2.0 security : defending AJAX, RIA and SOA ent://SD_ILS/0/SD_ILS:316234 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Shah, Shreeraj<br/>Author&#160;Shah, Shreeraj<br/>Format:&#160;Books<br/>Call Number&#160;CP 012173<br/>Publisher&#160;Charles River Media,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584505501<br/> Hand vein feature extraction system ent://SD_ILS/0/SD_ILS:319700 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Ooi, Joo Guan, 1974-<br/>Author&#160;Ooi, Joo Guan, 1974-,&#160;Mohamed Khalil Mohd. Hani, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O54 2008 raf<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2008<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:325496 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2008<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418067335<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:335048 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Cross, Michael<br/>Author&#160;Cross, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C765 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492768<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:337596 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B36 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:306904 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M23 2008 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Analysis on network reconnaisance activities using unsupervised learning approach ent://SD_ILS/0/SD_ILS:306950 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Mohamad Nizam Khalid<br/>Author&#160;Mohamad Nizam Khalid,&#160;Kamalrulnizam Abu Bakar, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M545 2008 raf<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Network security : know it all ent://SD_ILS/0/SD_ILS:333039 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Joshi, James<br/>Author&#160;Joshi, James<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N57 2008<br/>Publisher&#160;Morgan Kaufmann/Elsevier,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780123744630<br/> Building an effective information security policy architecture ent://SD_ILS/0/SD_ILS:334683 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Bacik, Sandy<br/>Author&#160;Bacik, Sandy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 2008<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420059052<br/> Protecting games : a security handbook for game developers and publishers ent://SD_ILS/0/SD_ILS:334756 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Davis, Steven<br/>Author&#160;Davis, Steven<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D38 2008<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781584506706<br/> Exploiting online games : cheating massively distributed systems ent://SD_ILS/0/SD_ILS:261796 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Hoglund, Greg<br/>Author&#160;Hoglund, Greg,&#160;McGraw, Gary, 1966-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H63 2008<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780132271912<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:262949 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Kanclirz, Jan<br/>Author&#160;Kanclirz, Jan,&#160;Baskin, Brian<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N33 2008<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492577<br/> IT compliance and controls : best practices for implementation ent://SD_ILS/0/SD_ILS:263000 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;DeLuccia, James J.<br/>Author&#160;DeLuccia, James J.<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 D45 2008<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470145012<br/> Foundations of communications electronic warfare ent://SD_ILS/0/SD_ILS:263577 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Poisel, Richard<br/>Author&#160;Poisel, Richard<br/>Format:&#160;Books<br/>Call Number&#160;UG590 P66 2008<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596933910<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-05-20T13:47:16Z 2024-05-20T13:47:16Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/>