Search Results for - Narrowed by: Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-20T13:47:16ZComputer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-05-20T13:47:16Z2024-05-20T13:47:16Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectivesent://SD_ILS/0/SD_ILS:8823242024-05-20T13:47:16Z2024-05-20T13:47:16Zby Gupta, Brij, Dr., 1982-, editor<br/>Author Gupta, Brij, Dr., 1982-, editor, Agrawal, Dharma P., Dr., editor, Wang, Haoxiang, Dr., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C668 2019<br/>Publication Date 2019<br/>ISBN 9780815371335<br/>Security in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-05-20T13:47:16Z2024-05-20T13:47:16Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applicationsent://SD_ILS/0/SD_ILS:8732412024-05-20T13:47:16Z2024-05-20T13:47:16Zby Song, Houbing, editor<br/>Author Song, Houbing, editor, Fink, Glenn A., editor, Jeschke, Sabina, editor<br/>Format: Books<br/>Call Number TK5105.59 S434 2018<br/>Edition First edition<br/>Publication Date 2018<br/>ISBN 9781119226048<br/>CYBERSECURITY ESSENTIALSent://SD_ILS/0/SD_ILS:8823362024-05-20T13:47:16Z2024-05-20T13:47:16Zby Brooks, Charles J., author<br/>Author Brooks, Charles J., author, Grow, Christophe, author, Craig, Philip, author, Short, Donald, author<br/>Format: Books<br/>Call Number TK5105.59 B76 2018<br/>Publication Date 2018<br/>ISBN 9781119362395<br/>Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategiesent://SD_ILS/0/SD_ILS:8732362024-05-20T13:47:16Z2024-05-20T13:47:16Zby Winkler, Ira, author<br/>Author Winkler, Ira, author, Gomes, Araceli Treu, author, Shackleford, Dave, editor<br/>Format: Books<br/>Call Number TK5105.59 W56 2017<br/>Publication Date 2017<br/>ISBN 9780128093160<br/>Advanced Penetration Testing : Hacking the World's Most Secure Networksent://SD_ILS/0/SD_ILS:8732382024-05-20T13:47:16Z2024-05-20T13:47:16Zby Allsopp, Wil, author<br/>Author Allsopp, Wil, author<br/>Format: Books<br/>Call Number QA76.9.A25 A4544 2017<br/>Publication Date 2017<br/>ISBN 9781119367680<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Cloud computing three-factor user authentication framework and protocols for telecare medical information systement://SD_ILS/0/SD_ILS:8491742024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zeeshan Siddiqui, 1979-, author<br/>Author Zeeshan Siddiqui, 1979-, author, Abdul Hanan Abdullah, supervisor, Muhammad Khurram Khan, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number R858 Z33 2015 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Online psychographic model for insider identificationent://SD_ILS/0/SD_ILS:8491882024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ikuesan Richard Adeyemi, 1983-, author<br/>Author Ikuesan Richard Adeyemi, 1983-, author, Shukor Abdul Razak, supervisor, Mazleena Salleh, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849188.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhanced framework for alert processing using clustering approach based on artifical immune systement://SD_ILS/0/SD_ILS:8492042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ashara Banu Mohamed, 1969-, author<br/>Author Ashara Banu Mohamed, 1969-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849204.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer) - Universiti Teknologi Malaysia, 2015<br/>Gravitational search algorithm-based anomly intrusion detection systement://SD_ILS/0/SD_ILS:8493412024-05-20T13:47:16Z2024-05-20T13:47:16Zby Salima Omar M. Hamad, 1963-, author<br/>Author Salima Omar M. Hamad, 1963-, author, Md. Asri Ngadi, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849341.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhanced framework for alert processing using clustering approach based on artifical immune systement://SD_ILS/0/SD_ILS:8513622024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ashara Banu Mohamed, 1969-, author<br/>Author Ashara Banu Mohamed, 1969-, author<br/>Format: Books<br/>Call Number CP 054731 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Gravitational search algorithm-based anomly intrusion detection systement://SD_ILS/0/SD_ILS:8515022024-05-20T13:47:16Z2024-05-20T13:47:16Zby Salima Omar M. Hamad, 1963- , author<br/>Author Salima Omar M. Hamad, 1963- , author<br/>Format: Books<br/>Call Number CP 054786 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Cloud computing three-factor user authentication framework and protocols for telecare medical information systement://SD_ILS/0/SD_ILS:8515232024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zeeshan Siddiqui, 1979-, author<br/>Author Zeeshan Siddiqui, 1979-, author<br/>Format: Books<br/>Call Number CP 054792 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>Online psychographic model for insider identificationent://SD_ILS/0/SD_ILS:8513602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ikuesan Richard Adeyemi, 1983-<br/>Author Ikuesan Richard Adeyemi, 1983-<br/>Format: Books<br/>Call Number CP 054732 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Developing network vulnerability prediction and detection applicationent://SD_ILS/0/SD_ILS:8594482024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mehran Janfeshan, 1987-, author<br/>Author Mehran Janfeshan, 1987-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 M44 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Public key infrastructure authentication framework (PKIAF) for Malaysian public sectorent://SD_ILS/0/SD_ILS:8594772024-05-20T13:47:16Z2024-05-20T13:47:16Zby Noraida Aman Nor, 1985-, author<br/>Author Noraida Aman Nor, 1985-, author, Ganthan Narayana Samy, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N6735 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Public key infrastructure authentication framework (PKIAF) for Malaysian public sectorent://SD_ILS/0/SD_ILS:8594782024-05-20T13:47:16Z2024-05-20T13:47:16Zby Noraida Aman Nor, 1985-, author<br/>Author Noraida Aman Nor, 1985-, author, Ganthan Narayana Samy, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034722 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>SECURITY IN COMPUTING & NETWORKING. PART IIent://SD_ILS/0/SD_ILS:8658392024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, Hassan Chizari, 1975-, contributor, Mahnoush Babaeizadeh, 1988-, contributor, Majid Bakhtiari, 1961-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S439 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835211515<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-05-20T13:47:16Z2024-05-20T13:47:16Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithment://SD_ILS/0/SD_ILS:8468552024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ong, Wen Jian, 1987-, author<br/>Author Ong, Wen Jian, 1987-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 O54 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithment://SD_ILS/0/SD_ILS:8468572024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ong, Wen Jian, 1987-, author<br/>Author Ong, Wen Jian, 1987-, author<br/>Format: Books<br/>Call Number CP 052944 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>Developing network vulnerability prediction and detection applicationent://SD_ILS/0/SD_ILS:8594492024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mehran Janfeshan, 1987-, author<br/>Author Mehran Janfeshan, 1987-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034751 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>SECURITY IN COMPUTING & NETWORKING. PART 1ent://SD_ILS/0/SD_ILS:8643802024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, A. Ahmed Ibrahim Alkilary, contributor, Affandi Husain, contributor, Hassan Chizari, 1975-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S438 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 35000000012313<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:8225492024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mowbray, Thomas J.<br/>Author Mowbray, Thomas J.<br/>Format: Books<br/>Call Number QA76.9.A25 M69 2014<br/>Publisher John Wiley and Sons,<br/>Publication Date 2014 2013<br/>ISBN 9781118697115<br/>Guide to network defense and countermeasuresent://SD_ILS/0/SD_ILS:8225862024-05-20T13:47:16Z2024-05-20T13:47:16Zby Weaver, Randy, author<br/>Author Weaver, Randy, author, Weaver, Dawn, author, Farwood, Dean, author<br/>Format: Books<br/>Call Number TK5105.59 W424 2014<br/>Edition Third edition<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781133727941<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:8257332024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jacobs, Stuart<br/>Author Jacobs, Stuart<br/>Format: Books<br/>Call Number TK5105.59 J334 2014<br/>Publisher IEEE Press/Wiley,<br/>Publication Date 2014<br/>ISBN 9780470565131<br/>Analysis of DoS attacks effects on cloud computing performanceent://SD_ILS/0/SD_ILS:8259702024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmed Kadhim Noor, 1989-<br/>Author Ahmed Kadhim Noor, 1989-, Mohammad Abdur Razzaque, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A46 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310212024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author, Mazdak Zamani, 1979-, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5103.2 B35 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310222024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author<br/>Format: Books<br/>Call Number CP 033623 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:8312392024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C934 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166813<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:8314152024-05-20T13:47:16Z2024-05-20T13:47:16Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 O75 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031713<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:8330942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Middleton, Bruce, 1953-, author<br/>Author Middleton, Bruce, 1953-, author<br/>Format: Books<br/>Call Number TK5105.59 M53 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781482206470<br/>A cloud security audit quality model for a commercial bank in Malaysiaent://SD_ILS/0/SD_ILS:8438712024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mariana Md. Hashim, 1982-, author<br/>Author Mariana Md. Hashim, 1982-, author, Mazdak Zamani, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.585 M375 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A cloud security audit quality model for a commercial bank in Malaysiaent://SD_ILS/0/SD_ILS:8438722024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mariana Md. Hashim, 1982-, author<br/>Author Mariana Md. Hashim, 1982-, author, Mazdak Zamani, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034206 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-05-20T13:47:16Z2024-05-20T13:47:16Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:8211522024-05-20T13:47:16Z2024-05-20T13:47:16Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:8213652024-05-20T13:47:16Z2024-05-20T13:47:16Zby Stapleton, J. J. (Jeffrey James)<br/>Author Stapleton, J. J. (Jeffrey James)<br/>Format: Books<br/>Call Number QA76.9.A25 S84 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466592148<br/>Guidelines for improving security awareness courses in technical and vocational training corporation in Saudi Arabiaent://SD_ILS/0/SD_ILS:8309812024-05-20T13:47:16Z2024-05-20T13:47:16Zby Almalki, Hassan Mohammed<br/>Author Almalki, Hassan Mohammed, Ganthan Narayana Samy, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 A464 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Analysis of user awareness on phishing attempt among studentent://SD_ILS/0/SD_ILS:8311172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vanisri Nagalingam<br/>Author Vanisri Nagalingam, Ganthan Narayana Samy, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 V36 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Analysis of user awareness on phishing attempt among studentent://SD_ILS/0/SD_ILS:8311192024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vanisri Nagalingam<br/>Author Vanisri Nagalingam, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033629 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:8284382024-05-20T13:47:16Z2024-05-20T13:47:16Zby Sanders, Chris, 1986-<br/>Author Sanders, Chris, 1986-, Smith, Jason (Adjunct associate professor), author<br/>Format: Books<br/>Call Number QA76.9.A25 S264 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124172081<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:8372132024-05-20T13:47:16Z2024-05-20T13:47:16Zby Williams, Walter, author<br/>Author Williams, Walter, author<br/>Format: Books<br/>Call Number TK5105.5828 W55 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466584020<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:8383882024-05-20T13:47:16Z2024-05-20T13:47:16Zby Andress, Jason<br/>Author Andress, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 A535 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128007440<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-05-20T13:47:16Z2024-05-20T13:47:16Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Architectures and protocols for secure information technology infrastructuresent://SD_ILS/0/SD_ILS:8412052024-05-20T13:47:16Z2024-05-20T13:47:16Zby Martinez, Antonio Ruiz, 1976-, editor<br/>Author Martinez, Antonio Ruiz, 1976-, editor, Marin-Lopez, Rafael, 1977-, editor, Garcia, Fernando Pereniguez, 1984-, editor<br/>Format: Books<br/>Call Number QA76.9.A25 A73 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466645141<br/>Network security technologies : design and applicationsent://SD_ILS/0/SD_ILS:8412102024-05-20T13:47:16Z2024-05-20T13:47:16Zby Amine, Abdelmalek, editor<br/>Author Amine, Abdelmalek, editor, Ait Mohamed, Otmane, editor, Benatallah, Boualem, editor<br/>Format: Books<br/>Call Number TK5105.59 N483 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466647893<br/>Security, privacy, trust, and resource management in mobile and wireless communicationsent://SD_ILS/0/SD_ILS:8412642024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rawat, Danda B., 1977-, editor<br/>Author Rawat, Danda B., 1977-, editor, Bista, Bhed B., 1967-, editor, Yan, Gongjun, 1976-, editor<br/>Format: Books<br/>Call Number TK5103.2 S435 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466646919<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:8359182024-05-20T13:47:16Z2024-05-20T13:47:16Zby Basta, Alfred, author<br/>Author Basta, Alfred, author, Basta, Nadine, author, Brown, Mary, author<br/>Format: Books<br/>Call Number TK5101.59 B37 2014<br/>Edition Second edition<br/>Publisher Course Technology, Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9780840020932<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:8372822024-05-20T13:47:16Z2024-05-20T13:47:16Zby DeFranco, Joanna F author<br/>Author DeFranco, Joanna F author<br/>Format: Books<br/>Call Number TK5105.59 D44 2013<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466564527<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-05-20T13:47:16Z2024-05-20T13:47:16Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:8379442024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ligh, Michael Hale, author<br/>Author Ligh, Michael Hale, author, Case, Andrew, author, Levy, Jamie, author, Walters, Aaron, author<br/>Format: Books<br/>Call Number QA76.9.A25 L54 2014<br/>Publication Date 2014<br/>ISBN 9781118825099<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-05-20T13:47:16Z2024-05-20T13:47:16Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:8380792024-05-20T13:47:16Z2024-05-20T13:47:16Zby Sood, Aditya K., author<br/>Author Sood, Aditya K., author, Enbody, Richard J.<br/>Format: Books<br/>Call Number TK5105.59 S66 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780128006047<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:7989222024-05-20T13:47:16Z2024-05-20T13:47:16Zby Fichera, Joe<br/>Author Fichera, Joe, Bolt, Steven<br/>Format: Books<br/>Call Number TK5105.59 F53 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597499620<br/>Comparison of pattern matching algorithm for enhancing snort performanceent://SD_ILS/0/SD_ILS:8037702024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abubakar Abdulkadir, 1982-<br/>Author Abubakar Abdulkadir, 1982-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A28 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:8038172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Tam, Kenneth<br/>Author Tam, Kenneth<br/>Format: Books<br/>Call Number TK5105.59 U86 2013 a<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497473<br/>Comparison of pattern matching algorithm for enhancing snort performanceent://SD_ILS/0/SD_ILS:8041042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abubakar Abdulkadir, 1982-<br/>Author Abubakar Abdulkadir, 1982-<br/>Format: Books<br/>Call Number CP 029927 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Security patterns in practice : designing secure architectures using software patternsent://SD_ILS/0/SD_ILS:8041742024-05-20T13:47:16Z2024-05-20T13:47:16Zby Fernandez, Eduardo B.<br/>Author Fernandez, Eduardo B.<br/>Format: Books<br/>Call Number TK5105.59 F47 2013<br/>Publisher Wiley,<br/>Publication Date 2013<br/>ISBN 9781119998945<br/>Information securityent://SD_ILS/0/SD_ILS:8042932024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rhodes-Ousley, Mark<br/>Author Rhodes-Ousley, Mark<br/>Format: Books<br/>Call Number TK5105.59 R46 2013<br/>Edition 2nd ed.<br/>Publisher McGraw Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071784351<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045062024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdifatah Abdirahman Abdullahi, 1986-<br/>Author Abdifatah Abdirahman Abdullahi, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdifatah Abdirahman Abdullah, 1986- author<br/>Author Abdifatah Abdirahman Abdullah, 1986- author, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 030021 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Network and information security : issues, challenges and research trendsent://SD_ILS/0/SD_ILS:8054292024-05-20T13:47:16Z2024-05-20T13:47:16Zby Sarma, Nityananda<br/>Author Sarma, Nityananda, Bhattacharyya, Dhruba K.<br/>Format: Books<br/>Call Number TK5105.59 N484 2013<br/>Publisher Narosa Publishing House,<br/>Publication Date 2013<br/>ISBN 9788184873146<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:8056972024-05-20T13:47:16Z2024-05-20T13:47:16Zby Yang, Christopher C.<br/>Author Yang, Christopher C.<br/>Format: Books<br/>Call Number QA76.9.A25 I58 2013<br/>Edition 1st ed.<br/>Publisher Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date 2013<br/>ISBN 9780124047020<br/>An enhanced connectivity aware routing protocol for vehicular ad hoc networksent://SD_ILS/0/SD_ILS:8114772024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmadu Maidorawa, 1972-<br/>Author Ahmadu Maidorawa, 1972-, Kamalrulnizam Abu Bakar, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TE228.37 A36 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Anti-phishing design for phishing websites detection using classifier ensembleent://SD_ILS/0/SD_ILS:8116452024-05-20T13:47:16Z2024-05-20T13:47:16Zby Oluwatobi Ayodeji Akanbi, 1986- author<br/>Author Oluwatobi Ayodeji Akanbi, 1986- author, Mohd Azaini Maarof, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 O48 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devicesent://SD_ILS/0/SD_ILS:8117032024-05-20T13:47:16Z2024-05-20T13:47:16Zby Parisa Naraei, 1988-<br/>Author Parisa Naraei, 1988-, Mazleena Salleh, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.5668 P37 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devicesent://SD_ILS/0/SD_ILS:8117042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Parisa Naraei, 1988-<br/>Author Parisa Naraei, 1988-<br/>Format: Books<br/>Call Number CP 031193 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security management metrics in web applicationent://SD_ILS/0/SD_ILS:8118942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Hafiz Abd. Rahim, 1984-<br/>Author Mohd. Hafiz Abd. Rahim, 1984-<br/>Format: Books<br/>Call Number CP 031731 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Security risks in social media technologies : safe practices in public service applicationsent://SD_ILS/0/SD_ILS:8139312024-05-20T13:47:16Z2024-05-20T13:47:16Zby Oxley, Alan<br/>Author Oxley, Alan<br/>Format: Books<br/>Call Number TK5105.59 O95 2013<br/>Publisher Chandos Pub.,<br/>Publication Date 2013<br/>ISBN 9781843347149<br/>Cyber crime, security and digital intelligenceent://SD_ILS/0/SD_ILS:8313512024-05-20T13:47:16Z2024-05-20T13:47:16Zby Johnson, Mark, 1959- author<br/>Author Johnson, Mark, 1959- author<br/>Format: Books<br/>Call Number HV6773 J64 2013<br/>Publisher Gower,<br/>Publication Date 2013<br/>ISBN 9781409454496 9781409454502<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-05-20T13:47:16Z2024-05-20T13:47:16Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:8053022024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bhattacharyya, Dhruba K.<br/>Author Bhattacharyya, Dhruba K., Kalita, Jugal Kumar<br/>Format: Books<br/>Call Number TK5105.59 B474 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466582088<br/>Web application defender's cookbook : battling hackers and protecting usersent://SD_ILS/0/SD_ILS:8065072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Barnett, Ryan C.<br/>Author Barnett, Ryan C.<br/>Format: Books<br/>Call Number QA76.9.A25 B377 2013<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2013 2012<br/>ISBN 9781118362181<br/>An enhanced connectivity aware routing protocol for vehicular ad hoc networksent://SD_ILS/0/SD_ILS:8114802024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmadu Maidorawa, 1972-<br/>Author Ahmadu Maidorawa, 1972-<br/>Format: Books<br/>Call Number CP 031078 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Hybrid artificial neural network and gravitational search algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8117212024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rahati, Shahdokht, 1982-<br/>Author Rahati, Shahdokht, 1982-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 R347 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Hybrid artificial neural network and gravitational search algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8117222024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rahati, Shahdokht, 1982-<br/>Author Rahati, Shahdokht, 1982-<br/>Format: Books<br/>Call Number CP 031733 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Distributed networks : intelligence, security, and applicationsent://SD_ILS/0/SD_ILS:8117272024-05-20T13:47:16Z2024-05-20T13:47:16Zby Memon, Qurban A.<br/>Author Memon, Qurban A.<br/>Format: Books<br/>Call Number QA76.9.D5 D556 2014<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466559578<br/>Information security management metrics in web applicationent://SD_ILS/0/SD_ILS:8118902024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Hafiz Abd. Rahim, 1984-<br/>Author Mohd. Hafiz Abd. Rahim, 1984-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M649 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>The practice of network security monitoring : understanding incident detection and responseent://SD_ILS/0/SD_ILS:8147622024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B455 2013<br/>Publisher No Starch Press,<br/>Publication Date 2013<br/>ISBN 9781593275099<br/>The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practiceent://SD_ILS/0/SD_ILS:7979862024-05-20T13:47:16Z2024-05-20T13:47:16Zby Winterfeld, Steve<br/>Author Winterfeld, Steve, Andress, Jason<br/>Format: Books<br/>Call Number U163 W56 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9780124047372<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:8284572024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C665 2013 f<br/>Edition 2nd ed.<br/>Publisher Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9780123943972<br/>Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructureent://SD_ILS/0/SD_ILS:8380592024-05-20T13:47:16Z2024-05-20T13:47:16Zby Knapp, Eric D. editor<br/>Author Knapp, Eric D. editor, Samani, Raj editor<br/>Format: Books<br/>Call Number TK3105 A67 2013<br/>Publisher Elsevier Science,<br/>Publication Date 2013<br/>ISBN 9781597499989<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408232024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034013 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Botnet traffic detection on android operating systement://SD_ILS/0/SD_ILS:8356432024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abang Abdul Rasyid Abang Yusop<br/>Author Abang Abdul Rasyid Abang Yusop, Bharanidharan Shanmugam, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 A236 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Professional penetration testingent://SD_ILS/0/SD_ILS:8383102024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wilhelm, Thomas, author<br/>Author Wilhelm, Thomas, author, Neely, Matthew, editor<br/>Format: Books<br/>Call Number TK5105.59 W544 2013<br/>Edition Second edition<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9781597499934<br/>Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8408422024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bojnord, Hoda Soltanian<br/>Author Bojnord, Hoda Soltanian, Teddy Mantoro, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B664 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408222024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 H35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8408442024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bojnord, Hoda Soltanian<br/>Author Bojnord, Hoda Soltanian<br/>Format: Books<br/>Call Number CP 033625 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Elements for privacy policy in E-Commerce based on higher education perspective[electronic resource]ent://SD_ILS/0/SD_ILS:7931862024-05-20T13:47:16Z2024-05-20T13:47:16Zby Afiqah Ahmad Said, 1986-<br/>Author Afiqah Ahmad Said, 1986-<br/>Format: Books<br/>Call Number CP 028741 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/>A study on hazard risk governance framework in FSKSM UTM Skudaient://SD_ILS/0/SD_ILS:7931872024-05-20T13:47:16Z2024-05-20T13:47:16Zby Amalina Farhan Kamaruddin, 1985-<br/>Author Amalina Farhan Kamaruddin, 1985-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A435 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Comparative evaluation of nerual network and support vector machine in detecting simox fraudent://SD_ILS/0/SD_ILS:7931692024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdikarim Hussiein Elmi, 1987-<br/>Author Abdikarim Hussiein Elmi, 1987-<br/>Format: Books<br/>Call Number CP 028102 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Support vector machine for solving small dataset problement://SD_ILS/0/SD_ILS:7963992024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmad Rijal Abdul Rahman, 1985-<br/>Author Ahmad Rijal Abdul Rahman, 1985-, Zuwairie Ibrahim, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 A34 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/>Support vector machine for solving imbalanced dataset problement://SD_ILS/0/SD_ILS:7970542024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ismail Mohd. Khairuddin, 1987-<br/>Author Ismail Mohd. Khairuddin, 1987-, Zuwairie Ibrahim, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 I84 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/>Support vector machine for solving imbalanced dataset problement://SD_ILS/0/SD_ILS:7970712024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ismail Mohd. Khairuddin, 1987-<br/>Author Ismail Mohd. Khairuddin, 1987-<br/>Format: Books<br/>Call Number CP 028699 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:7979482024-05-20T13:47:16Z2024-05-20T13:47:16Zby Shimonski, Robert<br/>Author Shimonski, Robert, Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 S55 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597495905<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:7979622024-05-20T13:47:16Z2024-05-20T13:47:16Zby Shema, Mike<br/>Author Shema, Mike<br/>Format: Books<br/>Call Number TK5105.59 S545 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499514<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:8013632024-05-20T13:47:16Z2024-05-20T13:47:16Zby McClure, Stuart<br/>Author McClure, Stuart, McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M483 2012<br/>Edition 7th ed.<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071780285<br/>Greedy intersection-mode routing strategy protocol for vehicular networksent://SD_ILS/0/SD_ILS:8037672024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Author Mahmoud Ahmad Salem Al-Khasawneh, 1980-, Md. Asri Ngadi, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TE228.37 M34 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Greedy intersection-mode routing strategy protocol for vehicular networksent://SD_ILS/0/SD_ILS:8041172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Author Mahmoud Ahmad Salem Al-Khasawneh, 1980-<br/>Format: Books<br/>Call Number CP 029817 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:8053012024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ganguly, Debashis<br/>Author Ganguly, Debashis, Lahiri, Shibamouli<br/>Format: Books<br/>Call Number TK5105.59 G365 2012<br/>Publisher Science Publishers ; Distributed by CRC Press,<br/>Publication Date 2012<br/>ISBN 9781578087556<br/>Database securityent://SD_ILS/0/SD_ILS:8037132024-05-20T13:47:16Z2024-05-20T13:47:16Zby Basta, Alfred.<br/>Author Basta, Alfred., Zgola, Melissa, Bullaboy, Dana<br/>Format: Books<br/>Call Number QA76.9.D314 B37 2012<br/>Publisher Course Technology, Cengage Learning,<br/>Publication Date 2012<br/>ISBN 9781435453906<br/>PCI compliance : understand and implement effective PCI data security standard complianceent://SD_ILS/0/SD_ILS:8183942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Williams, Branden R.<br/>Author Williams, Branden R., Chuvakin, Anton<br/>Format: Books<br/>Call Number QA76.9.A25 P35 2012<br/>Edition 3rd ed.<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499484<br/>ARP poisoning detection and protection using client's ARP table monitoringent://SD_ILS/0/SD_ILS:7782332024-05-20T13:47:16Z2024-05-20T13:47:16Zby Navid Behboodian, 1986-<br/>Author Navid Behboodian, 1986-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N38 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>ARP poisoning detection and protection using client's ARP table monitoringent://SD_ILS/0/SD_ILS:7782342024-05-20T13:47:16Z2024-05-20T13:47:16Zby Navid Behboodian, 1986-<br/>Author Navid Behboodian, 1986-<br/>Format: Books<br/>Call Number CP 027522 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security awareness framework of mobile phones from users' perspectiveent://SD_ILS/0/SD_ILS:7784152024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohamed Hagi Abdulkadir, 1985-<br/>Author Mohamed Hagi Abdulkadir, 1985-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5103.2 M644 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security awareness framework of mobile phones from users' perspectiveent://SD_ILS/0/SD_ILS:7784162024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohamed Hagi Abdulkadir, 1985-<br/>Author Mohamed Hagi Abdulkadir, 1985-<br/>Format: Books<br/>Call Number CP 027523 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Secure document workflow for paper reviewing systement://SD_ILS/0/SD_ILS:7878072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Lee, San Chin, 1988-<br/>Author Lee, San Chin, 1988-<br/>Format: Books<br/>Call Number CP 027602 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Security features identification for CISCO routersent://SD_ILS/0/SD_ILS:7902842024-05-20T13:47:16Z2024-05-20T13:47:16Zby Foroozesh, Behnaz, 1981-<br/>Author Foroozesh, Behnaz, 1981-<br/>Format: Books<br/>Call Number CP 027549 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) – Universiti Teknologi Malaysia, 2012<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:7979842024-05-20T13:47:16Z2024-05-20T13:47:16Zby Clarke, Justin<br/>Author Clarke, Justin<br/>Format: Books<br/>Call Number QA76.9.A25 C542 2012<br/>Publisher Elsevier,<br/>Publication Date 2012<br/>ISBN 9781597499637<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:7986332024-05-20T13:47:16Z2024-05-20T13:47:16Zby Speed, Tyler Justin<br/>Author Speed, Tyler Justin<br/>Format: Books<br/>Call Number TK5105.59 S643 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439809822<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>Enhancing EAP-TLS authentication protocol for IEEE 802.11ient://SD_ILS/0/SD_ILS:7784312024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bahareh Shojaie, 1984-<br/>Author Bahareh Shojaie, 1984-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.5668 B34 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Enhancing EAP-TLS authentication protocol for IEEE 802.11ient://SD_ILS/0/SD_ILS:7784342024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bahareh Shojaie, 1984-<br/>Author Bahareh Shojaie, 1984-<br/>Format: Books<br/>Call Number CP 027778 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness level framework to assess bank employees : Maybank Taman Universiti case studyent://SD_ILS/0/SD_ILS:7863412024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bassem Gamal Hanash Qasem, 1984-<br/>Author Bassem Gamal Hanash Qasem, 1984-, Imran Ghani, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B375 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness level framework to assess bank employees Maybank Taman Universiti case studyent://SD_ILS/0/SD_ILS:7863442024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bassem Gamal Hanash Qasem, 1984-<br/>Author Bassem Gamal Hanash Qasem, 1984-<br/>Format: Books<br/>Call Number CP 028279 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Secure document workflow for paper reviewing systement://SD_ILS/0/SD_ILS:7877982024-05-20T13:47:16Z2024-05-20T13:47:16Zby Lee, San Chin, 1988-<br/>Author Lee, San Chin, 1988-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 L44 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Security features identification for CISCO routersent://SD_ILS/0/SD_ILS:7902822024-05-20T13:47:16Z2024-05-20T13:47:16Zby Foroozesh, Behnaz, 1981-<br/>Author Foroozesh, Behnaz, 1981-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.8.C57 F67 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) – Universiti Teknologi Malaysia, 2012<br/>Elements for privacy policy in E-Commerce based on higher education perspectiveent://SD_ILS/0/SD_ILS:7931752024-05-20T13:47:16Z2024-05-20T13:47:16Zby Afiqah Ahmad Said, 1986-<br/>Author Afiqah Ahmad Said, 1986-, Ab. Razak Che Hussin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A354 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/>A study on hazard risk governance framework in FSKSM UTM Skudaient://SD_ILS/0/SD_ILS:7931882024-05-20T13:47:16Z2024-05-20T13:47:16Zby Amalina Farhan Kamaruddin, 1985-<br/>Author Amalina Farhan Kamaruddin, 1985-<br/>Format: Books<br/>Call Number CP 028119 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Comparative evaluation of nerual network and support vector machine in detecting simox fraudent://SD_ILS/0/SD_ILS:7931662024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdikarim Hussiein Elmi, 1987-<br/>Author Abdikarim Hussiein Elmi, 1987-, Subariah Ibrahim, Roselina Salleh @ Sallehuddin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A235 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Support vector machine for solving small dataset problement://SD_ILS/0/SD_ILS:7964002024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmad Rijal Abdul Rahman, 1985-<br/>Author Ahmad Rijal Abdul Rahman, 1985-<br/>Format: Books<br/>Call Number CP 028613 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Mekatronik dan Kawalan Automatik)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365182024-05-20T13:47:16Z2024-05-20T13:47:16Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K43 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:8380042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author<br/>Format: Books<br/>Call Number QA76.9.A25 W34 2012<br/>Edition Fourth edition<br/>Publisher Course Technology,<br/>Publication Date 2012<br/>ISBN 9781111138219<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365192024-05-20T13:47:16Z2024-05-20T13:47:16Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034114 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security risk management : building an information security risk management program from the ground upent://SD_ILS/0/SD_ILS:7358272024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wheeler, Evan<br/>Author Wheeler, Evan<br/>Format: Books<br/>Call Number TK5105.59 W48 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496155<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:7488172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Winkler, J. R. (Joachim R.)<br/>Author Winkler, J. R. (Joachim R.)<br/>Format: Books<br/>Call Number QA76.585 W56 2011<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495929<br/>Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRSent://SD_ILS/0/SD_ILS:7653412024-05-20T13:47:16Z2024-05-20T13:47:16Zby Nur Farhana Jalalluddin<br/>Author Nur Farhana Jalalluddin<br/>Format: Books<br/>Call Number CP 026419 ra<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Windows registry forensics advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:8133672024-05-20T13:47:16Z2024-05-20T13:47:16Zby Carvey, Harlan<br/>Author Carvey, Harlan<br/>Format: Books<br/>Call Number CP 030880<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>Hacking exposed : web applications : web application security secrets and solutionsent://SD_ILS/0/SD_ILS:6431912024-05-20T13:47:16Z2024-05-20T13:47:16Zby Scambray, Joel<br/>Author Scambray, Joel, Liu, Vincent, Sima, Caleb<br/>Format: Books<br/>Call Number TK5105.59 S324 2011<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill Companies,<br/>Publication Date 2011<br/>ISBN 9780071740647<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:7300692024-05-20T13:47:16Z2024-05-20T13:47:16Zby Tiller, James S.<br/>Author Tiller, James S.<br/>Format: Books<br/>Call Number TK5105.59 T553 2011<br/>Publisher Auerbach Publications,<br/>Publication Date 2011<br/>ISBN 9780849370526<br/>Physical-layer security : from information theory to security engineeringent://SD_ILS/0/SD_ILS:8023302024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bloch, Matthieu, 1981-<br/>Author Bloch, Matthieu, 1981-, Barros, Joao<br/>Format: Books<br/>Call Number TK5105.59 B574 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521516501<br/>Network security : a decision and game-theoretic approachent://SD_ILS/0/SD_ILS:8117602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Alpcan, Tansu, 1975-<br/>Author Alpcan, Tansu, 1975-, Basar, Tamer<br/>Format: Books<br/>Call Number TK5105.59 A47 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521119320<br/>Cognitive radio networking and security : a game-theoretic viewent://SD_ILS/0/SD_ILS:7612732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Liu, K. J. Ray, 1961-<br/>Author Liu, K. J. Ray, 1961-, Wang, Beibei<br/>Format: Books<br/>Call Number TK5103.4815 L58 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521762311<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:7612902024-05-20T13:47:16Z2024-05-20T13:47:16Zby Davis, Chris (Christopher Michael)<br/>Author Davis, Chris (Christopher Michael), Schiller, Mike, Wheeler, Kevin<br/>Format: Books<br/>Call Number QA76.9.A93 D38 2011<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742382<br/>Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRSent://SD_ILS/0/SD_ILS:7653382024-05-20T13:47:16Z2024-05-20T13:47:16Zby Nur Farhana Jalalluddin<br/>Author Nur Farhana Jalalluddin, Syed Othmawi Abd. Rahman, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N43 2011 raf<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>An adaptive intrusion detection model for dynamic network traffic patterns using machine learning techniquesent://SD_ILS/0/SD_ILS:7708012024-05-20T13:47:16Z2024-05-20T13:47:16Zby Anazida Zainal, 1967-<br/>Author Anazida Zainal, 1967-, Mohd. Aizaini Maarof, supervisor, Siti Mariyam Shamsuddin, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A53 2011 raf<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>An adaptive intrusion detection model for dynamic network traffic patterns using machine learning techniquesent://SD_ILS/0/SD_ILS:7723092024-05-20T13:47:16Z2024-05-20T13:47:16Zby Anazida Zainal, 1967-<br/>Author Anazida Zainal, 1967-, Mohd. Aizaini Maarof, supervisor, Siti Mariyam Shamsuddin, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 025846 ra<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:7582562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2011<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136097044<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:7586052024-05-20T13:47:16Z2024-05-20T13:47:16Zby Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Rudolph, K., Tittel, Ed., Broom, Neil, Barrett, Diane<br/>Format: Books<br/>Call Number QA76.9.A25 S656 2011<br/>Edition Second edition.<br/>Publisher Wiley Publishing, Inc.<br/>Publication Date 2011<br/>ISBN 9780470931660<br/>Implementing SSL/TLS using cryptography and PKIent://SD_ILS/0/SD_ILS:7586092024-05-20T13:47:16Z2024-05-20T13:47:16Zby Davies, Joshua<br/>Author Davies, Joshua<br/>Format: Books<br/>Call Number TK5105.59 D38 2011<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc,<br/>Publication Date 2011<br/>ISBN 9780470920411<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:7587262024-05-20T13:47:16Z2024-05-20T13:47:16Zby Carvey, Harlan A.<br/>Author Carvey, Harlan A.<br/>Format: Books<br/>Call Number HV8079.C65 C373 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>Roadmap to information security : for IT and InfoSec managersent://SD_ILS/0/SD_ILS:7811022024-05-20T13:47:16Z2024-05-20T13:47:16Zby Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2011<br/>Publisher Cengage Learning,<br/>Publication Date 2011<br/>ISBN 9781435480308<br/>Introduction to security and network forensicsent://SD_ILS/0/SD_ILS:7850732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Buchanan, William J.<br/>Author Buchanan, William J.<br/>Format: Books<br/>Call Number QA76.9.A25 B824 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9780849335686<br/>Intrusion detection : a machine learning approachent://SD_ILS/0/SD_ILS:7807362024-05-20T13:47:16Z2024-05-20T13:47:16Zby Yu, Zhenwei<br/>Author Yu, Zhenwei, Tsai, Jeffrey J. P.<br/>Format: Books<br/>Call Number TK5105.59 Y89 2011<br/>Publisher Imperial College Press,<br/>Publication Date 2011<br/>ISBN 9781848164475<br/>Analysis issues of computer network security management for disposable dishes companies in Iranent://SD_ILS/0/SD_ILS:8378852024-05-20T13:47:16Z2024-05-20T13:47:16Zby Fatemeh Honarjoo<br/>Author Fatemeh Honarjoo<br/>Format: Books<br/>Call Number CP 034161 ra<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3777612024-05-20T13:47:16Z2024-05-20T13:47:16Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S72 2011<br/>Edition 4th ed.<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136108054<br/>Analysis and detection of P2P botnet based on node behaviourent://SD_ILS/0/SD_ILS:8359952024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammad Reza Rostami<br/>Author Mohammad Reza Rostami, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6436 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Analysis issues of computer network security management for disposable dishes companies in Iranent://SD_ILS/0/SD_ILS:8378842024-05-20T13:47:16Z2024-05-20T13:47:16Zby Fatemeh Honarjoo<br/>Author Fatemeh Honarjoo, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 F38 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:8384012024-05-20T13:47:16Z2024-05-20T13:47:16Zby Andress, Jason<br/>Author Andress, Jason, Rogers, Russ, editor<br/>Format: Computer file<br/>Call Number QA76.9.A25 A535 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496537<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:6034792024-05-20T13:47:16Z2024-05-20T13:47:16Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017398 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Analysis and implementation of security algorithms for wireless communicationsent://SD_ILS/0/SD_ILS:6041092024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdinasir Hassan Ali, 1977-<br/>Author Abdinasir Hassan Ali, 1977-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 020848 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:6041102024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Format: Computer file<br/>Call Number CP 025106 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamaatn maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Web services security development and architecture : theoretical and practical issuesent://SD_ILS/0/SD_ILS:6304182024-05-20T13:47:16Z2024-05-20T13:47:16Zby Gutierrez, Carlos, 1977-<br/>Author Gutierrez, Carlos, 1977-, Fernandez-Medina, Eduardo, 1973-, Piattini, Mario, 1966-<br/>Format: Books<br/>Call Number TK5105.88813 W427 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605669502 9781605669519<br/>Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:6404622024-05-20T13:47:16Z2024-05-20T13:47:16Zby Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>Improving corporate governance through ICT risk managementent://SD_ILS/0/SD_ILS:7317272024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bekzat Kalkabay, 1984-<br/>Author Bekzat Kalkabay, 1984-, Harihodin Selamat, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 B454 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/>Improving corporate governance through ICT risk managementent://SD_ILS/0/SD_ILS:7317282024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bekzat Kalkabay, 1984-<br/>Author Bekzat Kalkabay, 1984-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 023675 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/>Professional penetration testing : creating and operating a formal hacking labent://SD_ILS/0/SD_ILS:7488142024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wilhelm, Thomas<br/>Author Wilhelm, Thomas, Kanclirz, Jan<br/>Format: Books<br/>Call Number TK5105.59 W544 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597494250<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:7676622024-05-20T13:47:16Z2024-05-20T13:47:16Zby Johnson, Robert, 1946-<br/>Author Johnson, Robert, 1946-, Merkow, Mike<br/>Format: Books<br/>Call Number TK5105.59 J64 2010<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2010<br/>ISBN 9780763791322<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:8042702024-05-20T13:47:16Z2024-05-20T13:47:16Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P445 2010<br/>Edition 3rd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439839560<br/>A hybrid intelligent intrusion detection system using fuzzy logic and improved packet tracing modelent://SD_ILS/0/SD_ILS:6262682024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bharanidharan Shanmugam<br/>Author Bharanidharan Shanmugam, Norbik Bashah Idris, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 B42 2010 raf<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>A hybrid intelligent intrusion detection system using fuzzy logic and improved packet tracing modelent://SD_ILS/0/SD_ILS:6262692024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bharanidharan Shanmugam<br/>Author Bharanidharan Shanmugam, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 019660 ra<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>Hybrid detection technique for databases intrusion using SQL injection and insider misuse dataent://SD_ILS/0/SD_ILS:7313072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Aziah Asmawi, 1981-<br/>Author Aziah Asmawi, 1981-, Zailani Mohamed Sidek, supervisor, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A95 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Hybrid detection technique for databases intrusion using SQL injection and insider misuse dataent://SD_ILS/0/SD_ILS:7313082024-05-20T13:47:16Z2024-05-20T13:47:16Zby Aziah Asmawi, 1981-<br/>Author Aziah Asmawi, 1981-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 024288 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Seven deadliest web application attacksent://SD_ILS/0/SD_ILS:7588932024-05-20T13:47:16Z2024-05-20T13:47:16Zby Shema, Mike<br/>Author Shema, Mike, Ely, Adam<br/>Format: Books<br/>Call Number TK5105.59 S544 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495431<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:7588982024-05-20T13:47:16Z2024-05-20T13:47:16Zby Timm, Carl<br/>Author Timm, Carl, Perez, Richard, 1969-, Ely, Adam<br/>Format: Books<br/>Call Number TK5105.88817 T56 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495455<br/>A comparative study of K-Means and self organizing map (SOM) in intrusion detectionent://SD_ILS/0/SD_ILS:7593322024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wan Sharina Wan Ramli, 1987-<br/>Author Wan Sharina Wan Ramli, 1987-, Anazida Zainal, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 W367 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>A comparative study of k-means and self organizing map (SOM) in intrusion detectionent://SD_ILS/0/SD_ILS:7593342024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wan Sharina Wan Ramli, 1987-<br/>Author Wan Sharina Wan Ramli, 1987-<br/>Format: Books<br/>Call Number CP 026345 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594022024-05-20T13:47:16Z2024-05-20T13:47:16Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A99 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Airline special service request (SSR) passengers tracking system using RFIDent://SD_ILS/0/SD_ILS:7594922024-05-20T13:47:16Z2024-05-20T13:47:16Zby Foo, Yong Jing, 1987-<br/>Author Foo, Yong Jing, 1987-, Hazinah Kutty Mammi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 F66 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Airline special service request (SSR) passengers tracking system using RFIDent://SD_ILS/0/SD_ILS:7594932024-05-20T13:47:16Z2024-05-20T13:47:16Zby Foo, Yong Jing, 1987-<br/>Author Foo, Yong Jing, 1987-<br/>Format: Books<br/>Call Number CP 024836 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Registry protector : pengesanan pengubahan registry serta pemulihannyaent://SD_ILS/0/SD_ILS:7596292024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mak, Weng Hong<br/>Author Mak, Weng Hong, Abd. Bahrim Yusoff, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M354 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Permodelan prestasi GSM/GPRS terhadap kepelbagaian kelas trafik menggunakan kaedah pengumpukkan saluran CPSent://SD_ILS/0/SD_ILS:7597412024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wan Nurul Farah Izyana Wan Hanafi<br/>Author Wan Nurul Farah Izyana Wan Hanafi, Syed Othmawi Abd. Rahman, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 W58 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Permodelan prestasi GSM/GPRS terhadap kepelbagaian kelas trafik menggunakan kaedah pengumpukkan saluran CPSent://SD_ILS/0/SD_ILS:7597432024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wan Nurul Farah Izyana Wan Hanafi<br/>Author Wan Nurul Farah Izyana Wan Hanafi<br/>Format: Books<br/>Call Number CP 026380 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Secure file transfer system (SFTS)ent://SD_ILS/0/SD_ILS:7598752024-05-20T13:47:16Z2024-05-20T13:47:16Zby Tan, Chiaw Wei<br/>Author Tan, Chiaw Wei, Hazinah Kutty Mammi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 T367 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Secure file transfer system (SFTS)ent://SD_ILS/0/SD_ILS:7598762024-05-20T13:47:16Z2024-05-20T13:47:16Zby Tan, Chiaw Wei<br/>Author Tan, Chiaw Wei<br/>Format: Books<br/>Call Number CP 026659 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:7610262024-05-20T13:47:16Z2024-05-20T13:47:16Zby Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Barrett, Diane, Broom, Nell<br/>Format: Books<br/>Call Number QA76.9.A25 S657 2010<br/>Publisher Wiley,<br/>Publication Date 2010<br/>ISBN 9780470936122<br/>Firewall design and analysis /cAlex X. Liuent://SD_ILS/0/SD_ILS:7640642024-05-20T13:47:16Z2024-05-20T13:47:16Zby Liu, Alex X.<br/>Author Liu, Alex X.<br/>Format: Books<br/>Call Number TK5105.59 L57 2011<br/>Publisher World Scientific,<br/>Publication Date 2010<br/>ISBN 9789814261654<br/>Automated signature generation of network attacksent://SD_ILS/0/SD_ILS:7648132024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd Farhan Yusof, 1986-<br/>Author Mohd Farhan Yusof, 1986-, Muhammad Nadzir Marsono, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number XX(764813.1)<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Bimodal recognition based on thumbprint and thumb image using bayesian classfierent://SD_ILS/0/SD_ILS:7702652024-05-20T13:47:16Z2024-05-20T13:47:16Zby Low, Zhi Wei, 1982-<br/>Author Low, Zhi Wei, 1982-, Syed Abdul Rahman Al-Attas, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 L69 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2010<br/>Bimodal recognition based on thumbprint and thumb image using bayesian classfierent://SD_ILS/0/SD_ILS:7702662024-05-20T13:47:16Z2024-05-20T13:47:16Zby Low, Zhi Wei, 1982-<br/>Author Low, Zhi Wei, 1982-<br/>Format: Books<br/>Call Number CP 024776 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2010<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:7825812024-05-20T13:47:16Z2024-05-20T13:47:16Zby Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Barrett, Diane, Broom, Nell<br/>Format: Books<br/>Call Number CP 026529<br/>Publisher Wiley,<br/>Publication Date 2010<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:7589002024-05-20T13:47:16Z2024-05-20T13:47:16Zby Prowell, Stacy J.<br/>Author Prowell, Stacy J., Kraus, Rob, Borkin, Mike<br/>Format: Books<br/>Call Number TK5105.59 P76 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495493<br/>Sistem pengesanan penumpang kapal terbang melalui tiket menggunakan teknologi RFID dan SMSent://SD_ILS/0/SD_ILS:7594062024-05-20T13:47:16Z2024-05-20T13:47:16Zby Azzaharul Hamdi Abdul Aziz<br/>Author Azzaharul Hamdi Abdul Aziz<br/>Format: Books<br/>Call Number CP 024809 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Registry protector : pengesanan pengubahan registry serta pemulihannyaent://SD_ILS/0/SD_ILS:7596332024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mak, Weng Hong<br/>Author Mak, Weng Hong<br/>Format: Books<br/>Call Number CP 024838 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Analysis of wired network security facilities in securing wireless networkent://SD_ILS/0/SD_ILS:8361602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdul Kadir Ali Husein<br/>Author Abdul Kadir Ali Husein, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5103.2 A238 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Makumat)) - Universiti Teknologi Malaysia, 2010<br/>A network security policy for the faculty of engineering-University of Adenent://SD_ILS/0/SD_ILS:8405562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammed, Hani Mohammed Abdo<br/>Author Mohammed, Hani Mohammed Abdo, Raja Baharuddin Anom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M646 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Detection technique using correlation of network flows for IDSent://SD_ILS/0/SD_ILS:8405672024-05-20T13:47:16Z2024-05-20T13:47:16Zby Amoli, Payam Vahdani, 1986-<br/>Author Amoli, Payam Vahdani, 1986-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A466 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Detection technique using correlation of network flows for IDSent://SD_ILS/0/SD_ILS:8405682024-05-20T13:47:16Z2024-05-20T13:47:16Zby Amoli, Payam Vahdani, 1986-<br/>Author Amoli, Payam Vahdani, 1986-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 033994 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Anomaly intrusion detection system using immune network with reduced network traffic featuresent://SD_ILS/0/SD_ILS:6034722024-05-20T13:47:16Z2024-05-20T13:47:16Zby Murad Abdo Rassam Qasem, 1980-<br/>Author Murad Abdo Rassam Qasem, 1980-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 022926 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Awareness and acceptance analysis of information security policyent://SD_ILS/0/SD_ILS:6040602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Zuki Muda, 1968-<br/>Author Mohd. Zuki Muda, 1968-<br/>Format: Computer file<br/>Call Number CP 026661 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Komputer Sains-Keselamatan maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Analysis and effectiveness of signature based in detecting metamorphic virusent://SD_ILS/0/SD_ILS:6040632024-05-20T13:47:16Z2024-05-20T13:47:16Zby Syahrizal Azmir Md.Sharif, 1983-<br/>Author Syahrizal Azmir Md.Sharif, 1983-<br/>Format: Computer file<br/>Call Number CP 027177 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A study of trusted computing implementation in public sector information, communication and technology (ICT) domainent://SD_ILS/0/SD_ILS:6040732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rusnita Isnin @ Hamdan<br/>Author Rusnita Isnin @ Hamdan, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 025045 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>24 deadly sins of software security : programming flaws and how to fix thement://SD_ILS/0/SD_ILS:3875402024-05-20T13:47:16Z2024-05-20T13:47:16Zby Howard, Michael<br/>Author Howard, Michael, LeBlanc, David, 1960-, Viega, John<br/>Format: Books<br/>Call Number QA76.9.A25 H68 2010<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2010<br/>ISBN 9780071626750<br/>Awareness and acceptance analysis of information security policyent://SD_ILS/0/SD_ILS:3963892024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Zuki Muda, 1968-<br/>Author Mohd. Zuki Muda, 1968-, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M984 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Fast flux service networks detection modelent://SD_ILS/0/SD_ILS:3964072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Zaim Salleh, 1979-<br/>Author Mohd. Zaim Salleh, 1979-, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M93 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A study of trusted computing implementation in public sector information, communication and technology (ICT) domainent://SD_ILS/0/SD_ILS:3964402024-05-20T13:47:16Z2024-05-20T13:47:16Zby Rusnita Isnin @ Hamdan<br/>Author Rusnita Isnin @ Hamdan, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 R87 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Botnet detection by monitoring common network behaviorsent://SD_ILS/0/SD_ILS:3964482024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hossein Rouhani Zeidanloo, 1982-<br/>Author Hossein Rouhani Zeidanloo, 1982-, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 H67 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Non technical approach to multi layered network security against malwareent://SD_ILS/0/SD_ILS:3964752024-05-20T13:47:16Z2024-05-20T13:47:16Zby Christine Simfukwe, 1973-<br/>Author Christine Simfukwe, 1973-, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 C474 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>A network security management approach for WLANent://SD_ILS/0/SD_ILS:3966552024-05-20T13:47:16Z2024-05-20T13:47:16Zby Maziar Janbeglou, 1981-<br/>Author Maziar Janbeglou, 1981-, Suhaimi Ibrahim, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M394 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2010<br/>Analysis and implementation of security algorithms for wireless communicationsent://SD_ILS/0/SD_ILS:3967102024-05-20T13:47:16Z2024-05-20T13:47:16Zby Abdinasir Hassan Ali, 1977-<br/>Author Abdinasir Hassan Ali, 1977-, Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A22 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Analysis and effectiveness of signature based in detecting metamorphic virusent://SD_ILS/0/SD_ILS:3964002024-05-20T13:47:16Z2024-05-20T13:47:16Zby Syahrizal Azmir Md.Sharif, 1983-<br/>Author Syahrizal Azmir Md.Sharif, 1983-, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S934 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Detecting plaintext recovery attack in secure shell (SSH)ent://SD_ILS/0/SD_ILS:3967172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zaid Mujaiyid Putra Ahmad Baidowi, 1980-<br/>Author Zaid Mujaiyid Putra Ahmad Baidowi, 1980-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 Z35 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Anomaly intrusion detection system using immune network with reduced network traffic featuresent://SD_ILS/0/SD_ILS:3905822024-05-20T13:47:16Z2024-05-20T13:47:16Zby Murad Abdo Rassam Qasem, 1980-<br/>Author Murad Abdo Rassam Qasem, 1980-, Mohd. Aizaini Maarof, supervisor, Anazida Zainal, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M87 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:3905902024-05-20T13:47:16Z2024-05-20T13:47:16Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Abdul Hanan Abdullah, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M325 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Network intrusion detection and prevention : concepts and techniquesent://SD_ILS/0/SD_ILS:3349552024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>Improving a multi-factor authentication using multiple graphical password and PDAent://SD_ILS/0/SD_ILS:8361942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jalal Mawlud H.Bradi<br/>Author Jalal Mawlud H.Bradi, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 J353 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Improving a multi-factor authentication using multiple graphical password and PDAent://SD_ILS/0/SD_ILS:8361952024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jalal Mawlud H.Bradi<br/>Author Jalal Mawlud H.Bradi<br/>Format: Books<br/>Call Number CP 034158 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardwareent://SD_ILS/0/SD_ILS:3638562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vishnu Paramasivam, 1984-<br/>Author Vishnu Paramasivam, 1984-, Mohamed Khalil Mohd. Hani, supervisor, Muhammad Mun'im Ahmad Zabidi, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 V574 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2009<br/>Development of security in wireless network using IPv6ent://SD_ILS/0/SD_ILS:3790242024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vikneswary Jayapal, 1982-<br/>Author Vikneswary Jayapal, 1982-, Sharifah Hafizah Syed Ariffin, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7872.D48 V55 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan Elektrik(Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia,2009<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:6028042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ciampa, Mark<br/>Author Ciampa, Mark<br/>Format: Computer file<br/>Call Number CP 016690<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2009<br/>SSL and TLS : theory and practiceent://SD_ILS/0/SD_ILS:6279042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.59 O67 2009<br/>Publisher Artech House,<br/>Publication Date 2009<br/>ISBN 9781596934474<br/>Socioeconomic and legal implications of electronic intrusionent://SD_ILS/0/SD_ILS:6319362024-05-20T13:47:16Z2024-05-20T13:47:16Zby Politis, Dionysios<br/>Author Politis, Dionysios, Kozyris, Phaedon J. (Phaedon John), Iglezakis, Ioannis, 1965-<br/>Format: Books<br/>Call Number HV6773 S634 2009 f<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605662046 9781605662053<br/>Cisco ASA Configurationent://SD_ILS/0/SD_ILS:6219802024-05-20T13:47:16Z2024-05-20T13:47:16Zby Deal, Richard<br/>Author Deal, Richard<br/>Format: Books<br/>Call Number TK5105.59 D429 2009<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2009<br/>ISBN 9780071622691<br/>Authentication study and implementation using IPSEC and IEEE 802.1X technologyent://SD_ILS/0/SD_ILS:5905822024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmed Omar Al-Amodi, 1984-<br/>Author Ahmed Omar Al-Amodi, 1984-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019818 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>An embedded system for networking security applying cryptographic acceleration in field programmable gate array hardwareent://SD_ILS/0/SD_ILS:5981732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vishnu Paramasivam, 1984-<br/>Author Vishnu Paramasivam, 1984-, Fakulti Kejuruteraan Elektrik<br/>Format: Computer file<br/>Call Number CP 019219 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2009<br/>Prototype development for embedding large amount of information using secure LSB and neural based steganographyent://SD_ILS/0/SD_ILS:5905792024-05-20T13:47:16Z2024-05-20T13:47:16Zby Basam N. Saleh<br/>Author Basam N. Saleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017327 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Study of secure firewall filtering mechanism for network securityent://SD_ILS/0/SD_ILS:6011012024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammed Mustafa Mohammed<br/>Author Mohammed Mustafa Mohammed, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 026228 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2009<br/>Development of security in wireless network using IPv6ent://SD_ILS/0/SD_ILS:6019712024-05-20T13:47:16Z2024-05-20T13:47:16Zby Vikneswary Jayapal, 1982-<br/>Author Vikneswary Jayapal, 1982-, Fakulti Kejuruteraan Elektrik<br/>Format: Computer file<br/>Call Number CP 023107 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan Elektrik(Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia,2009<br/>Next generation SSH2 implementation : securing data in motionent://SD_ILS/0/SD_ILS:2820242024-05-20T13:47:16Z2024-05-20T13:47:16Zby Liu, Dale<br/>Author Liu, Dale<br/>Format: Books<br/>Call Number QA76.9.A25 L58 2009<br/>Publisher Syngress,<br/>Publication Date 2009<br/>ISBN 9781597492836<br/>Security of information and communication networksent://SD_ILS/0/SD_ILS:2821112024-05-20T13:47:16Z2024-05-20T13:47:16Zby Kartalopoulos, Stamatios V.<br/>Author Kartalopoulos, Stamatios V.<br/>Format: Books<br/>Call Number TK5105.59 K37 2009<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2009<br/>ISBN 9780470290255<br/>Hacking exposed 6 : network security secrets and solutionsent://SD_ILS/0/SD_ILS:2874802024-05-20T13:47:16Z2024-05-20T13:47:16Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number QA76.9.A25 M325 2009<br/>Publisher McGraw-Hill,<br/>Publication Date 2009<br/>ISBN 9780071613743<br/>Security in wireless mesh networksent://SD_ILS/0/SD_ILS:2975562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zhang, Yan<br/>Author Zhang, Yan, Zheng, Jun, Hu, Honglin, 1975-<br/>Format: Books<br/>Call Number TK5103.2 S44 2009<br/>Publisher CRC,<br/>Publication Date 2009<br/>ISBN 9780849382505<br/>SIP securityent://SD_ILS/0/SD_ILS:3003462024-05-20T13:47:16Z2024-05-20T13:47:16Zby Sisalem, Dorgham<br/>Author Sisalem, Dorgham<br/>Format: Books<br/>Call Number TK5105.59 S56 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470516362<br/>Study of secure firewall filtering mechanism for network securityent://SD_ILS/0/SD_ILS:3718032024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammed Mustafa Mohammed<br/>Author Mohammed Mustafa Mohammed, Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M68 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2009<br/>Prototype development for embedding large amount of information using secure LSB and neural based steganographyent://SD_ILS/0/SD_ILS:3225252024-05-20T13:47:16Z2024-05-20T13:47:16Zby Basam N. Saleh<br/>Author Basam N. Saleh, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B374 2009 raf<br/>Publication Date 2009<br/><a href="http://eprints.utm.my/9764">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Architecting secure software systemsent://SD_ILS/0/SD_ILS:3287162024-05-20T13:47:16Z2024-05-20T13:47:16Zby Talukder, Asoke K.<br/>Author Talukder, Asoke K., Chaitanya, Manish<br/>Format: Books<br/>Call Number QA76.9.A25 T33 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420087840<br/>Security software development : assessing and managing security risksent://SD_ILS/0/SD_ILS:3194162024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ashbaugh, Douglas A.<br/>Author Ashbaugh, Douglas A.<br/>Format: Books<br/>Call Number QA76.9.A25 A84 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9781420063806<br/>Authentication study and implementation using IPSEC and IEEE 802.1X technologyent://SD_ILS/0/SD_ILS:3225422024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ahmed Omar Al-Amodi, 1984-<br/>Author Ahmed Omar Al-Amodi, 1984-, Zailani Mohamed Sidek, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 A55 2009 raf<br/>Publication Date 2009<br/><a href="http://eprints.utm.my/5147">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>IPv6 securityent://SD_ILS/0/SD_ILS:3282252024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hogg, Scott<br/>Author Hogg, Scott, Vyncke, Eric<br/>Format: Books<br/>Call Number TK5105.59 H634 2009<br/>Publisher Cisco Press,<br/>Publication Date 2009<br/>ISBN 9781587055942<br/>Cisco secure firewall services module (FWSM)ent://SD_ILS/0/SD_ILS:3282072024-05-20T13:47:16Z2024-05-20T13:47:16Zby Blair, Ray, 1965-<br/>Author Blair, Ray, 1965-, Durai, Arvind<br/>Format: Books<br/>Call Number TK5105.59 B52 2009<br/>Publisher Cisco Press,<br/>Publication Date 2009<br/>ISBN 9781587053535<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3347392024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ciampa, Mark<br/>Author Ciampa, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 C524 2009<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2009<br/>ISBN 9781428340664<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Network security bibleent://SD_ILS/0/SD_ILS:3330372024-05-20T13:47:16Z2024-05-20T13:47:16Zby Cole, Eric<br/>Author Cole, Eric, Krutz, Ronald L., 1938-, Conley, James W.<br/>Format: Books<br/>Call Number QA76.9.A25 C645 2009<br/>Edition 2nd ed.<br/>Publisher Wiley Publishing,<br/>Publication Date 2009<br/>ISBN 9780470502495 9780764573972<br/>Introduction to network securityent://SD_ILS/0/SD_ILS:3346872024-05-20T13:47:16Z2024-05-20T13:47:16Zby Jacobson, Douglas<br/>Author Jacobson, Douglas<br/>Format: Books<br/>Call Number TK5105.59 J32 2009<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2009<br/>ISBN 9781584885436<br/>Statistical techniques for network security : modern statistically-based intrusion detection and protectionent://SD_ILS/0/SD_ILS:3349732024-05-20T13:47:16Z2024-05-20T13:47:16Zby Wang, Yun<br/>Author Wang, Yun<br/>Format: Books<br/>Call Number TK5105.59 W364 2009<br/>Publisher IGI Global,<br/>Publication Date 2009<br/>ISBN 9781599047089<br/>Security in an IPv6 environmentent://SD_ILS/0/SD_ILS:3395992024-05-20T13:47:16Z2024-05-20T13:47:16Zby Minoli, Daniel<br/>Author Minoli, Daniel, Kouns, Jake<br/>Format: Books<br/>Call Number TK5105.59 M56 2009<br/>Publisher Auerbach Publication,<br/>Publication Date 2009<br/>ISBN 9781420092295<br/>Principles of information securityent://SD_ILS/0/SD_ILS:2524602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number TK5105.59 W444 2009<br/>Edition 3rd ed.<br/>Publisher Thomson Course Technology,<br/>Publication Date 2009<br/>ISBN 9781423901778<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2322082024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hoffman, Daniel (Daniel V.), 1972-<br/>Author Hoffman, Daniel (Daniel V.), 1972-<br/>Format: Books<br/>Call Number TK5105.597 H63 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computingent://SD_ILS/0/SD_ILS:2107802024-05-20T13:47:16Z2024-05-20T13:47:16Zby Buttyan, Levente<br/>Author Buttyan, Levente, Hubaux, Jean-Pierre<br/>Format: Books<br/>Call Number TK5102.85 B87 2008<br/>Publisher Cambridge University Press,<br/>Publication Date 2008<br/>ISBN 9780521873710<br/>Network-aware security for group communicationsent://SD_ILS/0/SD_ILS:2258862024-05-20T13:47:16Z2024-05-20T13:47:16Zby Sun, Yan (Yan Lindsay)<br/>Author Sun, Yan (Yan Lindsay), Trappe, Wade, Liu, K. J. Ray, 1961-<br/>Format: Books<br/>Call Number TK5105.59 S86 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387688466<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:2321872024-05-20T13:47:16Z2024-05-20T13:47:16Zby Zou, Xukai, 1963-<br/>Author Zou, Xukai, 1963-, Dai, Yuan-Shun, Pan, Yi, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 Z68 2008<br/>Publisher World Scientific,<br/>Publication Date 2008<br/>ISBN 9789812703682<br/>Cisco ASA, PIX and FWSM firewall handbookent://SD_ILS/0/SD_ILS:2454332024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hucaby, David<br/>Author Hucaby, David, Hucaby, Dave<br/>Format: Books<br/>Call Number TK5105.59 H84 2008<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2008<br/>ISBN 9781587054570<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:2456462024-05-20T13:47:16Z2024-05-20T13:47:16Zby Basta, Alfred<br/>Author Basta, Alfred, Halton, Wolf<br/>Format: Books<br/>Call Number TK5101.59 B37 2008<br/>Publisher Thomson,<br/>Publication Date 2008<br/>ISBN 9781418048266<br/>Web 2.0 security : defending AJAX, RIA and SOAent://SD_ILS/0/SD_ILS:2493432024-05-20T13:47:16Z2024-05-20T13:47:16Zby Shah, Shreeraj<br/>Author Shah, Shreeraj<br/>Format: Books<br/>Call Number TK5105.59 S53 2008<br/>Publisher Charles River Media,<br/>Publication Date 2008<br/>ISBN 9781584505501<br/>An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacksent://SD_ILS/0/SD_ILS:3799172024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Yazid Idris, 1973-<br/>Author Mohd. Yazid Idris, 1973-, Abdul Hanan Abdullah, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M924 2008 raf<br/>Publication Date 2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/>Securing the information infrastructureent://SD_ILS/0/SD_ILS:6318672024-05-20T13:47:16Z2024-05-20T13:47:16Zby Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:5925212024-05-20T13:47:16Z2024-05-20T13:47:16Zby Nelson, Bill<br/>Author Nelson, Bill<br/>Format: Computer file<br/>Call Number CP 016065<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2008<br/>ISBN 9781418067335<br/>Hybrid fuzzy techniques for unsupervised intrusion detection systement://SD_ILS/0/SD_ILS:5836512024-05-20T13:47:16Z2024-05-20T13:47:16Zby Witcha Chimphlee<br/>Author Witcha Chimphlee, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017104 ra<br/>Publication Date 2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/>Analysis of an intrusion detection system based on immunilogyent://SD_ILS/0/SD_ILS:5860992024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammed Hussein Saeed Al-Amoudi<br/>Author Mohammed Hussein Saeed Al-Amoudi<br/>Format: Computer file<br/>Call Number CP 017191 ra<br/>Publication Date 2008<br/><a href="http://eprints.utm.my/9502">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:5882922024-05-20T13:47:16Z2024-05-20T13:47:16Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 016838<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Analysis on network reconnaisance activities using unsupervised learning approachent://SD_ILS/0/SD_ILS:5882992024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohamad Nizam Khalid<br/>Author Mohamad Nizam Khalid, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019560 ra<br/>Publication Date 2008<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>SUSE linux enterprise server security (cource 3075) : SLES to VMWere server student manual (PDF) self-study wookbook (PDF) self study filesent://SD_ILS/0/SD_ILS:5896902024-05-20T13:47:16Z2024-05-20T13:47:16Zby Eckert, Jason W.<br/>Author Eckert, Jason W., Novell, Inc.<br/>Format: Computer file<br/>Call Number CP 015660<br/>Publisher Thomson Course Technology,<br/>Publication Date 2008<br/>ISBN 9781428322233<br/>SUSE linux enterprise server security (cource 3075) : Suse Linux Enterprise Server 10ent://SD_ILS/0/SD_ILS:5896912024-05-20T13:47:16Z2024-05-20T13:47:16Zby Eckert, Jason W.<br/>Author Eckert, Jason W., Novell, Inc.<br/>Format: Computer file<br/>Call Number CP 014659<br/>Publisher Thomson Course Technology,<br/>Publication Date 2008<br/>ISBN 9781428322233<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:5897352024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hay, Andrew<br/>Author Hay, Andrew, Cid, Daniel, Bray, Rory<br/>Format: Computer file<br/>Call Number CP 015751<br/>Publisher Syngress Publishing Inc.,<br/>Publication Date 2008<br/>ISBN 9781597492409<br/>Hand vein feature extraction systement://SD_ILS/0/SD_ILS:5900142024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ooi, Joo Guan, 1974-<br/>Author Ooi, Joo Guan, 1974-, Fakulti Kejuruteraan Elektrik<br/>Format: Computer file<br/>Call Number CP 031230 ra<br/>Publication Date 2008<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2008<br/>An efficient on - line hurst parameter estimator for detecting volume - based network intrusion attacksent://SD_ILS/0/SD_ILS:6021382024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohd. Yazid Idris, 1973-<br/>Author Mohd. Yazid Idris, 1973-, Abdul Hanan Abdullah, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017038 ra<br/>Publication Date 2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-05-20T13:47:16Z2024-05-20T13:47:16Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Mastering system center data protection manager 2007ent://SD_ILS/0/SD_ILS:2866192024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ganger, Devin L.<br/>Author Ganger, Devin L., Femling, Ryan, 1975-<br/>Format: Books<br/>Call Number QA76.9.A25 G36 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470181522<br/>Hacking exposed web 2.0 : web 2.0 security secrets and solutionsent://SD_ILS/0/SD_ILS:2904092024-05-20T13:47:16Z2024-05-20T13:47:16Zby Cannings, Rich<br/>Author Cannings, Rich, Dwivedi, Himanshu, Lackey, Zane<br/>Format: Books<br/>Call Number TK5105.59 C36 2008<br/>Publisher McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780071494618<br/>Analysis of an intrusion detection system based on immunilogyent://SD_ILS/0/SD_ILS:2911032024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohammed Hussein Saeed Al-Amoudi<br/>Author Mohammed Hussein Saeed Al-Amoudi, Norbik Bashah Idris<br/>Format: Books<br/>Call Number TK5105.59 M6342 2008 raf<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2927122024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hoffman, Daniel V.<br/>Author Hoffman, Daniel V.<br/>Format: Books<br/>Call Number TK5105.597 H64 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Introduction to communication electronic warfare systemsent://SD_ILS/0/SD_ILS:3003812024-05-20T13:47:16Z2024-05-20T13:47:16Zby Poisel, Richard A.<br/>Author Poisel, Richard A.<br/>Format: Books<br/>Call Number UG590 P64 2008<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596934528<br/>Information security : a practical approachent://SD_ILS/0/SD_ILS:3497812024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bhaskar, S. M.<br/>Author Bhaskar, S. M., Ahson, S. I.<br/>Format: Books<br/>Call Number QA76.6.A25 B52 2008<br/>Publisher Alpha Science Intl Ltd,<br/>Publication Date 2008<br/>ISBN 9781842654583<br/>Digital privacy : theory, technologies and practicesent://SD_ILS/0/SD_ILS:2480712024-05-20T13:47:16Z2024-05-20T13:47:16Zby Acquisti, Alessandro<br/>Author Acquisti, Alessandro<br/>Format: Books<br/>Call Number QA76.9.A25 D58 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008 2007<br/>ISBN 9781420052176<br/>Information assurance : dependability and security in networked systemsent://SD_ILS/0/SD_ILS:2480862024-05-20T13:47:16Z2024-05-20T13:47:16Zby Qian, Yi, 1962-<br/>Author Qian, Yi, 1962-<br/>Format: Books<br/>Call Number TK5105.59 I58 2008<br/>Publisher Elsevier/Morgan Kaufmann,<br/>Publication Date 2008<br/>ISBN 9780123735669<br/>Software security engineering : a guide for project managersent://SD_ILS/0/SD_ILS:2620772024-05-20T13:47:16Z2024-05-20T13:47:16Zby Allen, Julia H.<br/>Author Allen, Julia H.<br/>Format: Books<br/>Call Number QA76.9.A25 S535 2008<br/>Publisher Addison-Wesley,<br/>Publication Date 2008<br/>ISBN 9780321509178<br/>Router security strategies : securing IP network traffic planesent://SD_ILS/0/SD_ILS:2722742024-05-20T13:47:16Z2024-05-20T13:47:16Zby Schudel, Gregg<br/>Author Schudel, Gregg, Smith, David J.<br/>Format: Books<br/>Call Number TK5105.543 S38 2007<br/>Publisher Cisco Press,<br/>Publication Date 2008<br/>ISBN 9781587053368<br/>The craft of system securityent://SD_ILS/0/SD_ILS:2723482024-05-20T13:47:16Z2024-05-20T13:47:16Zby Smith, Sean<br/>Author Smith, Sean, Marchesini, John<br/>Format: Books<br/>Call Number QA76.9.A25 S65 2008<br/>Publisher Addison Wesley,<br/>Publication Date 2008<br/>ISBN 9780321434838<br/>OSSEC host-based intrusion detection guideent://SD_ILS/0/SD_ILS:2813922024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hay, Andrew<br/>Author Hay, Andrew, Cid, Daniel, Bray, Rory<br/>Format: Books<br/>Call Number QA76.9.A25 H39 2008<br/>Publisher Syngress Publishing Inc.,<br/>Publication Date 2008<br/>ISBN 9781597492409<br/>Secure computer and network systems : modeling, analysis and designent://SD_ILS/0/SD_ILS:2867632024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ye, Nong<br/>Author Ye, Nong<br/>Format: Books<br/>Call Number TK5105.59 Y464 2008<br/>Publisher Hoboken, NJ : J. Wiley & Sons,<br/>Publication Date 2008<br/>ISBN 9780470023242<br/>Hybrid fuzzy techniques for unsupervised intrusion detection systement://SD_ILS/0/SD_ILS:2663562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Witcha Chimphlee<br/>Author Witcha Chimphlee, Abdul Hanan Abdullah, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 W87 2008 raf<br/>Publication Date 2008<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2008<br/>SUSE linux enterprise server securityent://SD_ILS/0/SD_ILS:2690672024-05-20T13:47:16Z2024-05-20T13:47:16Zby Eckert, Jason W.<br/>Author Eckert, Jason W., Novell, Inc.<br/>Format: Books<br/>Call Number QA76.9.A25 E24 2008<br/>Publisher Thomson Course Technology,<br/>Publication Date 2008<br/>ISBN 9781428322233<br/>Implementing 802.1X security solutions for wired and wireless networksent://SD_ILS/0/SD_ILS:2723302024-05-20T13:47:16Z2024-05-20T13:47:16Zby Geier, James T.<br/>Author Geier, James T.<br/>Format: Books<br/>Call Number TK5105.59 G44 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470168608<br/>End-to-end network security : defense-in-depthent://SD_ILS/0/SD_ILS:2723542024-05-20T13:47:16Z2024-05-20T13:47:16Zby Santos, Omar<br/>Author Santos, Omar<br/>Format: Books<br/>Call Number TK5105.59 S33 2007<br/>Publisher Cisco Press,<br/>Publication Date 2008<br/>ISBN 9781587053320<br/>Intrusion detection systemsent://SD_ILS/0/SD_ILS:3322942024-05-20T13:47:16Z2024-05-20T13:47:16Zby Di Pietro, Robert<br/>Author Di Pietro, Robert, Mancini, Luigi V.<br/>Format: Books<br/>Call Number TK5105.59 I56 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387772653<br/>Guide to firewalls and network securityent://SD_ILS/0/SD_ILS:3408222024-05-20T13:47:16Z2024-05-20T13:47:16Zby Whitman, Michael E.<br/>Author Whitman, Michael E.<br/>Format: Books<br/>Call Number TK5105.59 G84 2008<br/>Edition 2nd ed.<br/>Publisher Course Technology,<br/>Publication Date 2008<br/>ISBN 9781435420168<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>Web 2.0 security : defending AJAX, RIA and SOAent://SD_ILS/0/SD_ILS:3162342024-05-20T13:47:16Z2024-05-20T13:47:16Zby Shah, Shreeraj<br/>Author Shah, Shreeraj<br/>Format: Books<br/>Call Number CP 012173<br/>Publisher Charles River Media,<br/>Publication Date 2008<br/>ISBN 9781584505501<br/>Hand vein feature extraction systement://SD_ILS/0/SD_ILS:3197002024-05-20T13:47:16Z2024-05-20T13:47:16Zby Ooi, Joo Guan, 1974-<br/>Author Ooi, Joo Guan, 1974-, Mohamed Khalil Mohd. Hani, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 O54 2008 raf<br/>Publication Date 2008<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Mikroelektronik)) - Universiti Teknologi Malaysia, 2008<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:3254962024-05-20T13:47:16Z2024-05-20T13:47:16Zby Nelson, Bill<br/>Author Nelson, Bill<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2008<br/>Edition 3rd ed.<br/>Publisher Course Technology,<br/>Publication Date 2008<br/>ISBN 9781418067335<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:3350482024-05-20T13:47:16Z2024-05-20T13:47:16Zby Cross, Michael<br/>Author Cross, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 C765 2008<br/>Edition 2nd ed.<br/>Publisher Syngress,<br/>Publication Date 2008<br/>ISBN 9781597492768<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:3375962024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B36 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:3069042024-05-20T13:47:16Z2024-05-20T13:47:16Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M23 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Analysis on network reconnaisance activities using unsupervised learning approachent://SD_ILS/0/SD_ILS:3069502024-05-20T13:47:16Z2024-05-20T13:47:16Zby Mohamad Nizam Khalid<br/>Author Mohamad Nizam Khalid, Kamalrulnizam Abu Bakar, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M545 2008 raf<br/>Publication Date 2008<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-05-20T13:47:16Z2024-05-20T13:47:16Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Network security : know it allent://SD_ILS/0/SD_ILS:3330392024-05-20T13:47:16Z2024-05-20T13:47:16Zby Joshi, James<br/>Author Joshi, James<br/>Format: Books<br/>Call Number TK5105.59 N57 2008<br/>Publisher Morgan Kaufmann/Elsevier,<br/>Publication Date 2008<br/>ISBN 9780123744630<br/>Building an effective information security policy architectureent://SD_ILS/0/SD_ILS:3346832024-05-20T13:47:16Z2024-05-20T13:47:16Zby Bacik, Sandy<br/>Author Bacik, Sandy<br/>Format: Books<br/>Call Number QA76.9.A25 B32 2008<br/>Publisher CRC,<br/>Publication Date 2008<br/>ISBN 9781420059052<br/>Protecting games : a security handbook for game developers and publishersent://SD_ILS/0/SD_ILS:3347562024-05-20T13:47:16Z2024-05-20T13:47:16Zby Davis, Steven<br/>Author Davis, Steven<br/>Format: Books<br/>Call Number QA76.9.A25 D38 2008<br/>Publisher Course Technology,<br/>Publication Date 2008<br/>ISBN 9781584506706<br/>Exploiting online games : cheating massively distributed systemsent://SD_ILS/0/SD_ILS:2617962024-05-20T13:47:16Z2024-05-20T13:47:16Zby Hoglund, Greg<br/>Author Hoglund, Greg, McGraw, Gary, 1966-<br/>Format: Books<br/>Call Number TK5105.59 H63 2008<br/>Publisher Addison Wesley,<br/>Publication Date 2008<br/>ISBN 9780132271912<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:2629492024-05-20T13:47:16Z2024-05-20T13:47:16Zby Kanclirz, Jan<br/>Author Kanclirz, Jan, Baskin, Brian<br/>Format: Books<br/>Call Number TK5105.59 N33 2008<br/>Publisher Syngress Publishing,<br/>Publication Date 2008<br/>ISBN 9781597492577<br/>IT compliance and controls : best practices for implementationent://SD_ILS/0/SD_ILS:2630002024-05-20T13:47:16Z2024-05-20T13:47:16Zby DeLuccia, James J.<br/>Author DeLuccia, James J.<br/>Format: Books<br/>Call Number HD30.2 D45 2008<br/>Publisher John Wiley & Sons,<br/>Publication Date 2008<br/>ISBN 9780470145012<br/>Foundations of communications electronic warfareent://SD_ILS/0/SD_ILS:2635772024-05-20T13:47:16Z2024-05-20T13:47:16Zby Poisel, Richard<br/>Author Poisel, Richard<br/>Format: Books<br/>Call Number UG590 P66 2008<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596933910<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-05-20T13:47:16Z2024-05-20T13:47:16Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>