Search Results for - Narrowed by: Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list 2024-04-23T13:44:54Z Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Cybersecurity Analytics ent://SD_ILS/0/SD_ILS:887246 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Verma, Rakesh M., author<br/>Author&#160;Verma, Rakesh M., author,&#160;Marchette, David J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V47 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780367346010<br/> CYBER INFLUENCE AND COGNITIVE THREATS ent://SD_ILS/0/SD_ILS:887935 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Benson, Vladlena, editor<br/>Author&#160;Benson, Vladlena, editor,&#160;McAlaney, John, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C933 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780128192047<br/> Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives ent://SD_ILS/0/SD_ILS:882324 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Gupta, Brij, Dr., 1982-, editor<br/>Author&#160;Gupta, Brij, Dr., 1982-, editor,&#160;Agrawal, Dharma P., Dr., editor,&#160;Wang, Haoxiang, Dr., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C668 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815371335<br/> GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS ent://SD_ILS/0/SD_ILS:888152 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nelson, Bill, author<br/>Author&#160;Nelson, Bill, author,&#160;Phillips, Amelia, author,&#160;Steuart, Christopher, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2019<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781337568944<br/> Automated image based CAPTCHA Solver ent://SD_ILS/0/SD_ILS:870360 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Choong, Kai Bin, 1993-, author<br/>Author&#160;Choong, Kai Bin, 1993-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C466 2018 raf<br/>Publication Date&#160;2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:873229 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ciampa, Mark D., author<br/>Author&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C574 2018<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781337288781<br/> Automated image based CAPTCHA Solver ent://SD_ILS/0/SD_ILS:870363 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Choong, Kai Bin, 1993-, author<br/>Author&#160;Choong, Kai Bin, 1993-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 265430 ra<br/>Publication Date&#160;2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/> CYBERSECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:882336 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Brooks, Charles J., author<br/>Author&#160;Brooks, Charles J., author,&#160;Grow, Christophe, author,&#160;Craig, Philip, author,&#160;Short, Donald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B76 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119362395<br/> Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise ent://SD_ILS/0/SD_ILS:887256 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sachowski, Jason, author<br/>Author&#160;Sachowski, Jason, author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S23 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781138720930<br/> Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies ent://SD_ILS/0/SD_ILS:873236 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Winkler, Ira, author<br/>Author&#160;Winkler, Ira, author,&#160;Gomes, Araceli Treu, author,&#160;Shackleford, Dave, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W56 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9780128093160<br/> Malaysia Perlu Pakar Serangan Untuk Keselamatan Sistem Komputer ent://SD_ILS/0/SD_ILS:874830 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Author&#160;Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Format:&#160;Visual Materials<br/>Call Number&#160;CP 080656 a<br/>Publication Date&#160;2017<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:841037 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Knapp, Eric D.<br/>Author&#160;Knapp, Eric D.,&#160;Langill, Joel Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K53 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201149<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859369 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I27 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> A Model Of Security Awareness In Cloud Computing ent://SD_ILS/0/SD_ILS:859372 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdul Ghafar Jaafar, 1985-, author<br/>Author&#160;Abdul Ghafar Jaafar, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 A238 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859564 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034727 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:859894 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A366 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Detection of spam on feature selection using cuckoo's search algorithm ent://SD_ILS/0/SD_ILS:860736 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Maznif Arahin Mujail, 1991-, author<br/>Author&#160;Maznif Arahin Mujail, 1991-, author,&#160;Anazida Zainal, Dr., supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(860736.1)<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Detection of spam on feature selection using cuckoo's search algorithm ent://SD_ILS/0/SD_ILS:860737 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Maznif Arahin Mujail, 1991-, author<br/>Author&#160;Maznif Arahin Mujail, 1991-, author,&#160;Anazida Zainal, Dr., supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061247 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Pervasive Computing and Communications. Part II : QOS &amp; SECURITY ent://SD_ILS/0/SD_ILS:864714 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yahaya Coulibaly, editor<br/>Author&#160;Yahaya Coulibaly, editor,&#160;Mohammad Abdur Razzaque, editor,&#160;Adekemi Adedokun, contributor,&#160;Chong, Yuh Chwen, contributor,&#160;Fauziah Abdul Razak, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P473 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835210501<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART II ent://SD_ILS/0/SD_ILS:865839 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;Hassan Chizari, 1975-, contributor,&#160;Mahnoush Babaeizadeh, 1988-, contributor,&#160;Majid Bakhtiari, 1961-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S439 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835211515<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Information security : principles and new concepts ent://SD_ILS/0/SD_ILS:837058 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hobbs, Fiona, editor<br/>Author&#160;Hobbs, Fiona, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I549 2015 f v.1<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403063&#160;9781632403070&#160;9781632403087&#160;9781632403094<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:837219 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mukhopadhyay, Debdeep, author<br/>Author&#160;Mukhopadhyay, Debdeep, author,&#160;Chakraborty, Rajat Subhra, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M85 2015<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781439895832<br/> Designing and building security operations center ent://SD_ILS/0/SD_ILS:838365 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nathans, David<br/>Author&#160;Nathans, David<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N38 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008997<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:838366 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Talabis, Mark, author<br/>Author&#160;Talabis, Mark, author,&#160;McPherson, Robert, author,&#160;Miyamoto, I., author,&#160;Martin, Jason L., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T355 2015<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128002070<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859463 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohamad Roshidi Rozali, 1980-, author<br/>Author&#160;Mohamad Roshidi Rozali, 1980-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859464 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohamad Roshidi Rozali, 1980-<br/>Author&#160;Mohamad Roshidi Rozali, 1980-,&#160;Zuraini Ismai, author?UNAUTHORIZED,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034749 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> A model of security awareness in cloud computing ent://SD_ILS/0/SD_ILS:859645 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdul Ghafar Jaafar, 1985-, author<br/>Author&#160;Abdul Ghafar Jaafar, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034746 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Enhancing password storage security ent://SD_ILS/0/SD_ILS:860307 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yeoh, Soon Yau, 1991-, author<br/>Author&#160;Yeoh, Soon Yau, 1991-, author,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y46 2015 raf<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhancing password storage security ent://SD_ILS/0/SD_ILS:860337 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yeoh, Soon Yau, 1991-, author<br/>Author&#160;Yeoh, Soon Yau, 1991-, author,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061137 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:860784 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034789 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART 1 ent://SD_ILS/0/SD_ILS:864380 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;A. Ahmed Ibrahim Alkilary, contributor,&#160;Affandi Husain, contributor,&#160;Hassan Chizari, 1975-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S438 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;35000000012313<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:822586 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Weaver, Randy, author<br/>Author&#160;Weaver, Randy, author,&#160;Weaver, Dawn, author,&#160;Farwood, Dean, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2014<br/>Edition&#160;Third edition<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781133727941<br/> A virus disaster recovery plan framework for academic computing center ent://SD_ILS/0/SD_ILS:825488 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohamed Ismail Gurhan, 1985-<br/>Author&#160;Mohamed Ismail Gurhan, 1985-,&#160;Norafida Ithnin, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 M64 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Hands-on information security lab manual ent://SD_ILS/0/SD_ILS:828287 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author,&#160;Green, Andrew, author<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 W45 2014 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781285167572<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:831239 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C934 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166813<br/> Simplified computer incident response model for premium pension limited Nigeria ent://SD_ILS/0/SD_ILS:843364 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abubakar Mohammed, 1989-<br/>Author&#160;Abubakar Mohammed, 1989-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 051607 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843414 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S85 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843418 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052054 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> Preferred methodologies of penetration testing from information security professionals perspective ent://SD_ILS/0/SD_ILS:843902 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Irzani Wahid, 1985-, author<br/>Author&#160;Mohd. Irzani Wahid, 1985-, author,&#160;Bharanidharan Shanmugam, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6439 2014 raf<br/>Publication Date&#160;2014<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/> Success factors for ISMS self-implementation ent://SD_ILS/0/SD_ILS:844277 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norrjan Mohd Mustapha, author<br/>Author&#160;Norrjan Mohd Mustapha, author,&#160;Nurazean Maarop, supervisor<br/>Format:&#160;Books<br/>Call Number&#160;CP 034536 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Information Assurance)) - Universiti Teknologi Malaysia, 2014<br/> Security management : a critical thinking approach ent://SD_ILS/0/SD_ILS:804186 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Land, Michael<br/>Author&#160;Land, Michael,&#160;Ricks, Truett,&#160;Rocks, Bobby<br/>Format:&#160;Books<br/>Call Number&#160;HD61.51 L36 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466561779<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Cryptography for security and privacy in cloud computing ent://SD_ILS/0/SD_ILS:814026 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rass, Stefan<br/>Author&#160;Rass, Stefan,&#160;Slamanig, Daniel, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R37 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608075751<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:821152 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2014<br/>Edition&#160;6th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014&#160;2011<br/>ISBN&#160;9780133354690<br/> Network security essentials applications and standards ent://SD_ILS/0/SD_ILS:821220 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S725 2014<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780133370430<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:821365 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stapleton, J. J. (Jeffrey James)<br/>Author&#160;Stapleton, J. J. (Jeffrey James)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S84 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466592148<br/> A secure authentication method for NFC tags on smart posters ent://SD_ILS/0/SD_ILS:830958 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Halalzadeh, Ababasali<br/>Author&#160;Halalzadeh, Ababasali,&#160;Mohd. Shahidan Abdullah, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;HF5416 H35 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Evaluating digital forensic practices for money laundering in financial institution ent://SD_ILS/0/SD_ILS:831083 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jamilah Ahmad, 1982-, author<br/>Author&#160;Jamilah Ahmad, 1982-, author,&#160;Mohd. Shahidan Abdullah, 1960-, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;HV6768 J36 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Evaluating digital forensic practices for money laundering in financial institution ent://SD_ILS/0/SD_ILS:831084 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jamilah Ahmad, 1982-, author<br/>Author&#160;Jamilah Ahmad, 1982-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 033620 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Information security awareness and training program study on Wahda Bank-Libya ent://SD_ILS/0/SD_ILS:831096 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abubaker Essid Abuhtera, 1966-, author<br/>Author&#160;Abubaker Essid Abuhtera, 1966-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A284 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Information security awareness and training program study on Wahda Bank-Libya ent://SD_ILS/0/SD_ILS:831097 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abubaker Essid Abuhtera, 1966-, author<br/>Author&#160;Abubaker Essid Abuhtera, 1966-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034198 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> An improved SQL injection detection model in signature based IDS using tree structure ent://SD_ILS/0/SD_ILS:831098 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Amirmohammad Sadeghian, 1987- , author<br/>Author&#160;Amirmohammad Sadeghian, 1987- , author,&#160;Mazdak Zamani, 1979- , supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S236 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> An enhancement of traceability model based-on scenario for digital forensic investigation ent://SD_ILS/0/SD_ILS:831109 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Iman Ahmeid Mohamed, 1992-, author<br/>Author&#160;Iman Ahmeid Mohamed, 1992-, author,&#160;Azizah Abd. Manaf, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 I43 2014 raf<br/>Publication Date&#160;2014<br/>Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/> An enhancement of traceability model based-on scenario for digital forensic investigation ent://SD_ILS/0/SD_ILS:831110 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Iman Ahmeid Mohamed, 1992-, author<br/>Author&#160;Iman Ahmeid Mohamed, 1992-, author,&#160;Azizah Abd. Manaf, supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034188 ra<br/>Publication Date&#160;2014<br/>Sarjana Sains (Jaminan Maklumat)- Universiti Teknologi Malaysia, 2014<br/> Analysis of user awareness on phishing attempt among student ent://SD_ILS/0/SD_ILS:831117 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Vanisri Nagalingam<br/>Author&#160;Vanisri Nagalingam,&#160;Ganthan Narayana Samy, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V36 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Analysis of user awareness on phishing attempt among student ent://SD_ILS/0/SD_ILS:831119 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Vanisri Nagalingam<br/>Author&#160;Vanisri Nagalingam,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;CP 033629 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Improved implementation of digital watermarking techniques ent://SD_ILS/0/SD_ILS:824028 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmed Sabeeh Yousif, 1986-<br/>Author&#160;Ahmed Sabeeh Yousif, 1986-,&#160;Zaid Omar,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A365 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik-Mikroelektronik &amp; Sistem Komputer )) - Universiti Teknologi Malaysia, 2014<br/> Improved implementation of digital watermarking techniques ent://SD_ILS/0/SD_ILS:824030 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmed Sabeeh Yousif, 1986-<br/>Author&#160;Ahmed Sabeeh Yousif, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 032687 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik-Mikroelektronik &amp; Sistem Komputer )) - Universiti Teknologi Malaysia, 2014<br/> A virus disaster recovery plan framework for academic computing center ent://SD_ILS/0/SD_ILS:825533 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohamed Ismail Gurhan, 1985-<br/>Author&#160;Mohamed Ismail Gurhan, 1985-,&#160;Norafida Ithnin<br/>Format:&#160;Books<br/>Call Number&#160;CP 050530 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria ent://SD_ILS/0/SD_ILS:825920 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Wadzani Aduwamai Gadzama, 1983-<br/>Author&#160;Wadzani Aduwamai Gadzama, 1983-,&#160;Siti Hajar Othman,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W33 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria ent://SD_ILS/0/SD_ILS:825925 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Wadzani Aduwamai Gadzama, 1983-<br/>Author&#160;Wadzani Aduwamai Gadzama, 1983-,&#160;Siti Hajar Othman<br/>Format:&#160;Books<br/>Call Number&#160;CP 050841 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Applied network security monitoring : collection, detection, and analysis ent://SD_ILS/0/SD_ILS:828438 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sanders, Chris, 1986-<br/>Author&#160;Sanders, Chris, 1986-,&#160;Smith, Jason (Adjunct associate professor), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S264 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124172081<br/> Security for service oriented architectures ent://SD_ILS/0/SD_ILS:837213 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Williams, Walter, author<br/>Author&#160;Williams, Walter, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5828 W55 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584020<br/> Core software security : security at the source ent://SD_ILS/0/SD_ILS:837216 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ransome, James F., author<br/>Author&#160;Ransome, James F., author,&#160;Misra, Anmol, author,&#160;Schoenfield, Brook, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R364 2014<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466560956<br/> The science and technology of counterterrorism : measuring physical and electronic security risk ent://SD_ILS/0/SD_ILS:838145 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Young, Carl S., author<br/>Author&#160;Young, Carl S., author<br/>Format:&#160;Books<br/>Call Number&#160;HV6431 Y68 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124200562<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838388 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A535 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128007440<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Analyzing security, trust, and crime in the digital world ent://SD_ILS/0/SD_ILS:841204 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nemati, Hamid R., 1958- editor<br/>Author&#160;Nemati, Hamid R., 1958- editor<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A53 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466648562<br/> Organizational, legal, and technological dimensions of information system administration ent://SD_ILS/0/SD_ILS:841212 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Portela, Irene Maria, 1965-, editor<br/>Author&#160;Portela, Irene Maria, 1965-, editor,&#160;Almeida, Fernando, 1979-, editor<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 O74 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466645264<br/> Simplified computer incident response model for premium pension limited Nigeria ent://SD_ILS/0/SD_ILS:843359 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abubakar Mohammed, 1989- author<br/>Author&#160;Abubakar Mohammed, 1989- author,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A283 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> Preferred methodologies of penetration testing from information security professionals perspective ent://SD_ILS/0/SD_ILS:843903 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Irzani Wahid, 1985-, author<br/>Author&#160;Mohd. Irzani Wahid, 1985-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 034209 ra<br/>Publication Date&#160;2014<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/> Success factors for ISMS self-implementation ent://SD_ILS/0/SD_ILS:844276 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norrjan Mohd Mustapha, author<br/>Author&#160;Norrjan Mohd Mustapha, author,&#160;Nurazean Maarop, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N677 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Information Assurance)) - Universiti Teknologi Malaysia, 2014<br/> Cloud management and security ent://SD_ILS/0/SD_ILS:835570 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abbadi, Imad M., author<br/>Author&#160;Abbadi, Imad M., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 A235 2014<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118817094<br/> A cryptography primer : secrets and promises ent://SD_ILS/0/SD_ILS:835848 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Klein, Philip N., author<br/>Author&#160;Klein, Philip N., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K545 2014<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781107017887<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:837282 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;DeFranco, Joanna F author<br/>Author&#160;DeFranco, Joanna F author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D44 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564527<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:837944 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ligh, Michael Hale, author<br/>Author&#160;Ligh, Michael Hale, author,&#160;Case, Andrew, author,&#160;Levy, Jamie, author,&#160;Walters, Aaron, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L54 2014<br/>Publication Date&#160;2014<br/>ISBN&#160;9781118825099<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:838073 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author,&#160;Konar, Allan, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M475 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124170407<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Engineering safe and secure software systems ent://SD_ILS/0/SD_ILS:798047 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2013<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781608074723<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:799569 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Doherty, Eamon P.<br/>Author&#160;Doherty, Eamon P.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D64 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439898772<br/> Logical operators and its application in determining vulnerable websites caused by SQL injection among UTM faculty websites ent://SD_ILS/0/SD_ILS:801497 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nurul Fariha Mokhter, 1989-<br/>Author&#160;Nurul Fariha Mokhter, 1989-,&#160;Jamalludin Talib, supervisor,&#160;Fakulti Sains<br/>Format:&#160;Books<br/>Call Number&#160;x<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Matematik)) - Universiti Teknologi Malaysia, 2013<br/> An analysis on security awareness of social networks users ent://SD_ILS/0/SD_ILS:803468 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mahdi Darvishi, 1982-<br/>Author&#160;Mahdi Darvishi, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029830 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803483 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J54 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of task oriented maintenance model using secure software desgin maintenence ent://SD_ILS/0/SD_ILS:803544 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Essa Zaki Abdulrazak, 1979-<br/>Author&#160;Essa Zaki Abdulrazak, 1979-,&#160;Imran Ghani, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.754 E87 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of task oriented maintenance model using secure software desgin maintenence ent://SD_ILS/0/SD_ILS:803547 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Essa Zaki Abdulrazak, 1979-<br/>Author&#160;Essa Zaki Abdulrazak, 1979-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029826 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Supervised machine learning approach for detection of malicious executables ent://SD_ILS/0/SD_ILS:803768 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yahye Abukar Ahmed, 1986-<br/>Author&#160;Yahye Abukar Ahmed, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 Y34 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Supervised machine learning approach for detection of malicious executables ent://SD_ILS/0/SD_ILS:804115 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yahye Abukar Ahmed, 1986-<br/>Author&#160;Yahye Abukar Ahmed, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029818 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach ent://SD_ILS/0/SD_ILS:804288 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sabah Fadhel Hamood, 1973-<br/>Author&#160;Sabah Fadhel Hamood, 1973-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Information security ent://SD_ILS/0/SD_ILS:804293 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rhodes-Ousley, Mark<br/>Author&#160;Rhodes-Ousley, Mark<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R46 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw Hill Education,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780071784351<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804506 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdifatah Abdirahman Abdullahi, 1986-<br/>Author&#160;Abdifatah Abdirahman Abdullahi, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804507 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdifatah Abdirahman Abdullah, 1986- author<br/>Author&#160;Abdifatah Abdirahman Abdullah, 1986- author,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 030021 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:804509 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmed A. A. Abunada, 1987-<br/>Author&#160;Ahmed A. A. Abunada, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029972 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Network and information security : issues, challenges and research trends ent://SD_ILS/0/SD_ILS:805429 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sarma, Nityananda<br/>Author&#160;Sarma, Nityananda,&#160;Bhattacharyya, Dhruba K.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N484 2013<br/>Publisher&#160;Narosa Publishing House,<br/>Publication Date&#160;2013<br/>ISBN&#160;9788184873146<br/> Intelligent systems for security informatics ent://SD_ILS/0/SD_ILS:805697 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yang, Christopher C.<br/>Author&#160;Yang, Christopher C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I58 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124047020<br/> Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination ent://SD_ILS/0/SD_ILS:806156 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sayuthi Jaafar, 1962-<br/>Author&#160;Sayuthi Jaafar, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030475 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compression ent://SD_ILS/0/SD_ILS:807887 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Eng, Chia Jing, 1989-<br/>Author&#160;Eng, Chia Jing, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030805 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Credential purpose-based access control for personal data protection in web-based applications ent://SD_ILS/0/SD_ILS:809106 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norjihan Abdul Ghani, 1977- , author<br/>Author&#160;Norjihan Abdul Ghani, 1977- , author,&#160;Harihodin Selamat,&#160;Zailani Mohamed Sidek, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N676 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> The redundancy-based disaster recovery framework for cloud computing ent://SD_ILS/0/SD_ILS:811194 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sabbaghi, Fatemeh, 1977-<br/>Author&#160;Sabbaghi, Fatemeh, 1977-,&#160;Siti Hajar Othman,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 S23 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> The redundancy-based disaster recovery framework for cloud computing ent://SD_ILS/0/SD_ILS:811202 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sabbaghi, Fatemeh, 1977-<br/>Author&#160;Sabbaghi, Fatemeh, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;CP 033053 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebook ent://SD_ILS/0/SD_ILS:811429 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Author&#160;Ahmad Syahrul Anuar Saidi, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A36 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebook ent://SD_ILS/0/SD_ILS:811432 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Author&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031199 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> USB storage authentication, delegation and revocation mechanisms based on multilevel trust model ent://SD_ILS/0/SD_ILS:811570 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mahboubi, Arash, 1981-<br/>Author&#160;Mahboubi, Arash, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031143 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Restricted until June 2016<br/> Fasa kesediaan digital forensik bagi kerjaan Negeri Johor ent://SD_ILS/0/SD_ILS:811640 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ruzana Jaffar, 1975-<br/>Author&#160;Ruzana Jaffar, 1975-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 R89 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Fasa kesediaan digital forensik bagi kerjaan Negeri Johor ent://SD_ILS/0/SD_ILS:811642 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ruzana Jaffar, 1975-<br/>Author&#160;Ruzana Jaffar, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031182 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamtan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Development of metamodel for information security risk management ent://SD_ILS/0/SD_ILS:811646 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-,&#160;Siti Hajar Othman, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M648 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811669 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M379 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811670 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031190 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> An enhanced performance model for metamorphic computer virus classification and detection ent://SD_ILS/0/SD_ILS:816752 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Basharirad, Babak, 1979- , author<br/>Author&#160;Basharirad, Babak, 1979- , author,&#160;Maslin Masrom, supervisor,&#160;Suhaimi Ibrahim, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B376 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Safety management for software-based equipment ent://SD_ILS/0/SD_ILS:818636 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Boulanger, Jean-Louis<br/>Author&#160;Boulanger, Jean-Louis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B684 2013<br/>Publisher&#160;ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781848214521<br/> An enhancement of succinate and lactate production in escherichia coli with bat algorithm ent://SD_ILS/0/SD_ILS:819278 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Chua, Pooi San, 1989-, author<br/>Author&#160;Chua, Pooi San, 1989-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 082576 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Bioinformatik)) &ndash; Universiti Teknologi Malaysia, 2013<br/> Digital forensics explained ent://SD_ILS/0/SD_ILS:821062 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Gogolin, Greg.<br/>Author&#160;Gogolin, Greg.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 G64 2013<br/>Publisher&#160;Taylor &amp; Francis, CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439874950<br/> Cryptography in C and C++ ent://SD_ILS/0/SD_ILS:829247 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Welschenbach, Michael, author<br/>Author&#160;Welschenbach, Michael, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781430250982<br/> An information security awareness model for financial management infiormation system (FMIS) in Sudan ent://SD_ILS/0/SD_ILS:831023 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mahmoud, Suliman Mohamed<br/>Author&#160;Mahmoud, Suliman Mohamed,&#160;Zuraini Ismail,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M346 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Cyber crime, security and digital intelligence ent://SD_ILS/0/SD_ILS:831351 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Johnson, Mark, 1959- author<br/>Author&#160;Johnson, Mark, 1959- author<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 J64 2013<br/>Publisher&#160;Gower,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781409454496&#160;9781409454502<br/> Logical operators and its application in determining vulnerable webstites caused by SQL injection among UTM faculty websites ent://SD_ILS/0/SD_ILS:801583 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nurul Fariha Mokhter, 1989-<br/>Author&#160;Nurul Fariha Mokhter, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029434 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Matematik)) - Universiti Teknologi Malaysia, 2013<br/> Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian elimination ent://SD_ILS/0/SD_ILS:802817 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sayuthi Jaafar, 1962- , author<br/>Author&#160;Sayuthi Jaafar, 1962- , author,&#160;Azizah Abd. Manaf, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S29 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803486 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029824 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> An analysis on security awareness of social networks users ent://SD_ILS/0/SD_ILS:803463 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mahdi Darvishi, 1982-<br/>Author&#160;Mahdi Darvishi, 1982-,&#160;Imran Ghani, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HM742 M34 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:804503 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ahmed A. A. Abunada, 1987-<br/>Author&#160;Ahmed A. A. Abunada, 1987-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A364 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approach ent://SD_ILS/0/SD_ILS:804489 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sabah Fadhel Hamood, 1973-<br/>Author&#160;Sabah Fadhel Hamood, 1973-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030220 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Web application defender's cookbook : battling hackers and protecting users ent://SD_ILS/0/SD_ILS:806507 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Barnett, Ryan C.<br/>Author&#160;Barnett, Ryan C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B377 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub., Inc.,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9781118362181<br/> Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compression ent://SD_ILS/0/SD_ILS:807885 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Eng, Chia Jing, 1989-<br/>Author&#160;Eng, Chia Jing, 1989-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 E54 2013 raf<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/> Authentication using game ent://SD_ILS/0/SD_ILS:807906 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Juliza Auzir<br/>Author&#160;Juliza Auzir,&#160;Hazinah Kutty Mammi, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J85 2013 raf<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Authentication using game ent://SD_ILS/0/SD_ILS:807911 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Juliza Auzir<br/>Author&#160;Juliza Auzir<br/>Format:&#160;Books<br/>Call Number&#160;CP 030860 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811262 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A844 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Efficiency key generation management in a big organization for symmetric cryptography system ent://SD_ILS/0/SD_ILS:811264 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Atefeh Mirzaee, 1986-<br/>Author&#160;Atefeh Mirzaee, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030847 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Physical security measures framework for Marib power plant (Yemen) ent://SD_ILS/0/SD_ILS:811461 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Author&#160;Anas Mustafa Mohammed Al-Aghbari, 1981-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A534 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Physical security measures framework for Marib power plant (Yemen) ent://SD_ILS/0/SD_ILS:811464 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Author&#160;Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031197 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Covre optimization for image steganography by using image peatures ent://SD_ILS/0/SD_ILS:811548 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Zaid Nidhal Khudhair, 1988-<br/>Author&#160;Zaid Nidhal Khudhair, 1988-,&#160;Dzulkifli Mohamad,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.15 Z35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Covre optimization for image steganography by using image peatures ent://SD_ILS/0/SD_ILS:811552 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Zaid Nidhal Khudhair, 1988-<br/>Author&#160;Zaid Nidhal Khudhair, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031142 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Improving information system security by evaluating human factord ent://SD_ILS/0/SD_ILS:811553 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Saeed Soltanmohammadi, 1987-<br/>Author&#160;Saeed Soltanmohammadi, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S244 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Improving information system security by evaluating human factord ent://SD_ILS/0/SD_ILS:811555 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Saeed Soltanmohammadi, 1987-<br/>Author&#160;Saeed Soltanmohammadi, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031187 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> USB storage authentication, delegation and revocation mechanisms based on multilevel trust model ent://SD_ILS/0/SD_ILS:811568 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mahboubi, Arash, 1981-<br/>Author&#160;Mahboubi, Arash, 1981-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.B87 M34 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Hybrid artificial neural network and gravitational search algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:811721 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rahati, Shahdokht, 1982-<br/>Author&#160;Rahati, Shahdokht, 1982-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R347 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Hybrid artificial neural network and gravitational search algorithm in intrusion detection system ent://SD_ILS/0/SD_ILS:811722 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rahati, Shahdokht, 1982-<br/>Author&#160;Rahati, Shahdokht, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031733 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Coding ent://SD_ILS/0/SD_ILS:811744 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Alla Talib Mohsin, 1986-<br/>Author&#160;Alla Talib Mohsin, 1986-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A453 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Coding ent://SD_ILS/0/SD_ILS:811746 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Alla Talib Mohsin, 1986-<br/>Author&#160;Alla Talib Mohsin, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031153 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Multi level authentication mechanism for grid application using one-time password ent://SD_ILS/0/SD_ILS:811750 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Armaghan Behnia, 1986-<br/>Author&#160;Armaghan Behnia, 1986-,&#160;Imran Ghani, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A76 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Multi level authentication mechanism for grid application using one-time password ent://SD_ILS/0/SD_ILS:811751 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Armaghan Behnia, 1986-<br/>Author&#160;Armaghan Behnia, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031744 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:818448 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Raggo, Michael T., author<br/>Author&#160;Raggo, Michael T., author,&#160;Hosmer, Chet, author,&#160;McGrew, Wesley, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R346 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497435<br/> An enhanced performance model for metamorphic computer virus classification and detection ent://SD_ILS/0/SD_ILS:819405 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Basharirad, Babak, 1979-<br/>Author&#160;Basharirad, Babak, 1979-<br/>Format:&#160;Books<br/>Call Number&#160;CP 032010 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:821158 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag,&#160;Hinson, Gary,&#160;Kabay, M.E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439881521<br/> Management of information security ent://SD_ILS/0/SD_ILS:822690 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.6 W45 2013<br/>Edition&#160;4th ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781285062297<br/> Information security risk assessment toolkit : practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:797973 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Talabis, Mark<br/>Author&#160;Talabis, Mark,&#160;Martin, Jason<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T354 2013<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497350<br/> The hacker's guide to OS X : exploiting OS X from the root-up ent://SD_ILS/0/SD_ILS:797987 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bathurst, Robert<br/>Author&#160;Bathurst, Robert,&#160;Rogers, Russ,&#160;Ghassemlouei, Alijohn<br/>Format:&#160;Books<br/>Call Number&#160;QA76.774.M33 B38 2013<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597499507<br/> Discrete dynamical systems and chaotic machines : theory and applications ent://SD_ILS/0/SD_ILS:828823 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bahi, Jacques Mohcine, author<br/>Author&#160;Bahi, Jacques Mohcine, author,&#160;Guyeux, Christophe, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B344 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466554504<br/> Elementary information security ent://SD_ILS/0/SD_ILS:829121 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Smith, Richard E.<br/>Author&#160;Smith, Richard E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S658 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781449648206<br/> Cyber security for educational leaders : a guide to understanding and implementing technology policies ent://SD_ILS/0/SD_ILS:830049 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Phillips, Richard A.<br/>Author&#160;Phillips, Richard A.,&#160;Sianjina, Rayton R.<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.3 P454 2013<br/>Publisher&#160;Routledge,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780415631969&#160;9780415631976<br/> Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment ent://SD_ILS/0/SD_ILS:835043 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hau, Lian Hong<br/>Author&#160;Hau, Lian Hong,&#160;Bharanidharan Shanmugam, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H384 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains ( Information security)) - Universiti Teknologi Malaysia, 2013<br/> Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment ent://SD_ILS/0/SD_ILS:835044 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hau, Lian Hong<br/>Author&#160;Hau, Lian Hong<br/>Format:&#160;Books<br/>Call Number&#160;CP 033582 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Information security)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing cybersecurity awareness through role and performance based training model ent://SD_ILS/0/SD_ILS:835537 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Khan, Nouman Qadeer<br/>Author&#160;Khan, Nouman Qadeer,&#160;Samy, Ganthan Narayana,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K43 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2013<br/> Enhancing cybersecurity awareness through role and performance based training model ent://SD_ILS/0/SD_ILS:835538 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Khan, Nouman Qadeer<br/>Author&#160;Khan, Nouman Qadeer<br/>Format:&#160;Books<br/>Call Number&#160;CP 033549 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2013<br/> Information security vulnerability in an Iranian context from human perspective(electrical industry) ent://SD_ILS/0/SD_ILS:835551 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Pouransafar, Malahat<br/>Author&#160;Pouransafar, Malahat<br/>Format:&#160;Books<br/>Call Number&#160;CP 033585 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> An efficient recognition-based graphical password scheme improving security and usability ent://SD_ILS/0/SD_ILS:835646 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Khodadadi, Touraj<br/>Author&#160;Khodadadi, Touraj,&#160;Azizah Abdul Manaf,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K46 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:837215 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jacobson, Douglas, author<br/>Author&#160;Jacobson, Douglas, author,&#160;Idziorek, Joseph, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J334 2013<br/>Publisher&#160;CRC Press / Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439856185<br/> Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniques ent://SD_ILS/0/SD_ILS:840860 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bakhdlaghi, Yousef<br/>Author&#160;Bakhdlaghi, Yousef,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B352 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniques ent://SD_ILS/0/SD_ILS:840861 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bakhdlaghi, Yousef<br/>Author&#160;Bakhdlaghi, Yousef<br/>Format:&#160;Books<br/>Call Number&#160;CP 033967 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Preparedness in encountering cyberwarfare in Malaysia ent://SD_ILS/0/SD_ILS:841819 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norma Liyana Omar<br/>Author&#160;Norma Liyana Omar,&#160;Zuraini Ismail,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 N67 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Preparedness in encountering cyberwarfare in Malaysia ent://SD_ILS/0/SD_ILS:841821 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norma Liyana Omar<br/>Author&#160;Norma Liyana Omar<br/>Format:&#160;Books<br/>Call Number&#160;CP 034029 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security vulnerability in an Iranian context from human perspective(electrical industry) ent://SD_ILS/0/SD_ILS:835549 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Pouransafar, Malahat<br/>Author&#160;Pouransafar, Malahat,&#160;Nurazean Maarop, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P68 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A secure method against frequency attack for pattern query on encrypted string data ent://SD_ILS/0/SD_ILS:835655 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ravan, Rama Roshan<br/>Author&#160;Ravan, Rama Roshan,&#160;Norbik Bashah Idris,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R384 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A secure method against frequency attack for pattern query on encrypted string data ent://SD_ILS/0/SD_ILS:835657 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ravan, Rama Roshan<br/>Author&#160;Ravan, Rama Roshan<br/>Format:&#160;Books<br/>Call Number&#160;CP 033553 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Security basics for computer architects ent://SD_ILS/0/SD_ILS:835912 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Lee, Ruby B., author<br/>Author&#160;Lee, Ruby B., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L444 2013<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781627051552<br/> Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systems ent://SD_ILS/0/SD_ILS:837986 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Malin, Cameron H., author<br/>Author&#160;Malin, Cameron H., author,&#160;Aquilina, James M.,&#160;Casey, Eoghan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 M353 2013<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780124095076<br/> Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network ent://SD_ILS/0/SD_ILS:840842 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bojnord, Hoda Soltanian<br/>Author&#160;Bojnord, Hoda Soltanian,&#160;Teddy Mantoro,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B664 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc network ent://SD_ILS/0/SD_ILS:840844 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bojnord, Hoda Soltanian<br/>Author&#160;Bojnord, Hoda Soltanian<br/>Format:&#160;Books<br/>Call Number&#160;CP 033625 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> FSKSM UTM information security governance framework ent://SD_ILS/0/SD_ILS:793143 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Amir Haziq Loh Bojeng, 1986-<br/>Author&#160;Amir Haziq Loh Bojeng, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A457 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Elements for privacy policy in E-Commerce based on higher education perspective[electronic resource] ent://SD_ILS/0/SD_ILS:793186 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Afiqah Ahmad Said, 1986-<br/>Author&#160;Afiqah Ahmad Said, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028741 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/> A study on hazard risk governance framework in FSKSM UTM Skudai ent://SD_ILS/0/SD_ILS:793187 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Amalina Farhan Kamaruddin, 1985-<br/>Author&#160;Amalina Farhan Kamaruddin, 1985-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A435 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Measuring information security awareness level in public organization ent://SD_ILS/0/SD_ILS:793191 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Doaa Saleh Abobakar Baras, 1987-<br/>Author&#160;Doaa Saleh Abobakar Baras, 1987-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D63 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanism ent://SD_ILS/0/SD_ILS:793334 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Lim, Kah Seng, 1986-<br/>Author&#160;Lim, Kah Seng, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L565 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanism ent://SD_ILS/0/SD_ILS:793336 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Lim, Kah Seng, 1986-<br/>Author&#160;Lim, Kah Seng, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028068 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Hacking web apps : detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:797962 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Shema, Mike<br/>Author&#160;Shema, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S545 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499514<br/> Advances in intelligence and security informatics ent://SD_ILS/0/SD_ILS:798923 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mao, Wenji<br/>Author&#160;Mao, Wenji,&#160;Wang, Fei-Yue<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M335 2012<br/>Edition&#160;1st ed.<br/>Publisher&#160;Academic Press ; Zhejiang University Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780123972002<br/> Hacking exposed 7 : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:801363 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M483 2012<br/>Edition&#160;7th ed.<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780071780285<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:804149 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stallings, William<br/>Author&#160;Stallings, William,&#160;Brown, Lawrie<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S73 2012<br/>Edition&#160;2nd ed. International ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273764496<br/> Network and application security fundamentals and practices ent://SD_ILS/0/SD_ILS:805301 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ganguly, Debashis<br/>Author&#160;Ganguly, Debashis,&#160;Lahiri, Shibamouli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G365 2012<br/>Publisher&#160;Science Publishers ; Distributed by CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781578087556<br/> Embedded systems security : practical methods for safe and secure software and systems development ent://SD_ILS/0/SD_ILS:805596 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Kleidermacher, David<br/>Author&#160;Kleidermacher, David,&#160;Kleidermacher, Mike<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 K564 2012<br/>Edition&#160;1st ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780123868862<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:808318 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Colantonio, Alessandro<br/>Author&#160;Colantonio, Alessandro,&#160;Di Pietro, Roberto,&#160;Ocello, Alberto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C657 2012<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789814374002<br/> Reliability and availability of cloud computing ent://SD_ILS/0/SD_ILS:821145 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bauer, Eric<br/>Author&#160;Bauer, Eric,&#160;Adams, Randee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 B394 2012<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781118177013<br/> ARP poisoning detection and protection using client's ARP table monitoring ent://SD_ILS/0/SD_ILS:778233 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Navid Behboodian, 1986-<br/>Author&#160;Navid Behboodian, 1986-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N38 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> ARP poisoning detection and protection using client's ARP table monitoring ent://SD_ILS/0/SD_ILS:778234 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Navid Behboodian, 1986-<br/>Author&#160;Navid Behboodian, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027522 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778265 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027518 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Inference binary search algorithm for blind timing-based attack in MYSQL injector vulnerability checker tool ent://SD_ILS/0/SD_ILS:778548 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdilahi Deria Liban, 1982-<br/>Author&#160;Abdilahi Deria Liban, 1982-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.S67 A23 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Inference binary search algorithm for blind timing-based attack in MYSQL injector vulnerability checker tool ent://SD_ILS/0/SD_ILS:778549 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdilahi Deria Liban, 1982-<br/>Author&#160;Abdilahi Deria Liban, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027551 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:780002 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Pfleeger, Charles P., 1948-<br/>Author&#160;Pfleeger, Charles P., 1948-,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P45 2012<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780132789462<br/> Secure and resilient software : requirements, test cases, and testing methods ent://SD_ILS/0/SD_ILS:785387 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Raghavan, Lakshmikanth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.T48 M47 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439866214<br/> A study and development of graphical user authentication for web based application ent://SD_ILS/0/SD_ILS:786496 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Zamri Osman, 1987-<br/>Author&#160;Mohd. Zamri Osman, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M644 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> A study and development of graphical user authentication for web based application ent://SD_ILS/0/SD_ILS:786498 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Zamri Osman, 1987-<br/>Author&#160;Mohd. Zamri Osman, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027919 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Secure blood bag labeling via 2d barcode authentication ent://SD_ILS/0/SD_ILS:786531 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Asvhini Subramaniam, 1985-<br/>Author&#160;Asvhini Subramaniam, 1985-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A885 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Threat profiling based on vulnerability assessment and penetration testing: iphone case study ent://SD_ILS/0/SD_ILS:786923 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rafhana Abd Rashid, 1987-<br/>Author&#160;Rafhana Abd Rashid, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.8.I64 R34 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Threat profiling based on vulnerability assessment and penetration testing: iphone case study ent://SD_ILS/0/SD_ILS:786936 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Rafhana Abd Rashid, 1987-<br/>Author&#160;Rafhana Abd Rashid, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027694 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Teknik penyembunyian fingerprint honeypot maya(honeyd) dari penggodam ent://SD_ILS/0/SD_ILS:787565 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yanti Munirah Jusoh , author<br/>Author&#160;Yanti Munirah Jusoh , author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y363 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Pemantauan aktiviti penggodam dalam honeypot ent://SD_ILS/0/SD_ILS:787686 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nurul Hafizah Sebaweh, author<br/>Author&#160;Nurul Hafizah Sebaweh, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N879 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Pemantauan aktiviti penggodam dalam honeypot ent://SD_ILS/0/SD_ILS:787687 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nurul Hafizah Sebaweh, author<br/>Author&#160;Nurul Hafizah Sebaweh, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058429 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Video steganografi menggunakan fail video flash(FLV) ent://SD_ILS/0/SD_ILS:787886 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Farid Ahmad Nasir<br/>Author&#160;Mohd. Farid Ahmad Nasir,&#160;Md. Asri Ngadi,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.D47 M43 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Video steganografi menggunakan fail video flash(FLV) ent://SD_ILS/0/SD_ILS:787887 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd. Farid Ahmad Nasir<br/>Author&#160;Mohd. Farid Ahmad Nasir<br/>Format:&#160;Books<br/>Call Number&#160;CP 027702 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Least significant bit image steganography using particle swarm optimization and optical pixel adjustment ent://SD_ILS/0/SD_ILS:790277 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Parisa Gerami, 1994-<br/>Author&#160;Parisa Gerami, 1994-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P37 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> SQL injection attacks and defense ent://SD_ILS/0/SD_ILS:797984 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Clarke, Justin<br/>Author&#160;Clarke, Justin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C542 2012<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597499637<br/> Cyber security standards, practices and industrial applications : systems and methodologies ent://SD_ILS/0/SD_ILS:772975 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Author&#160;Zubairi, Junaid Ahmed, 1961-,&#160;Mahboob, Athar, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C93 2012 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781609608514&#160;9781609608521&#160;9781609608538<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778263 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A28 N37 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness level framework to assess bank employees : Maybank Taman Universiti case study ent://SD_ILS/0/SD_ILS:786341 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Author&#160;Bassem Gamal Hanash Qasem, 1984-,&#160;Imran Ghani, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B375 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness level framework to assess bank employees Maybank Taman Universiti case study ent://SD_ILS/0/SD_ILS:786344 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Author&#160;Bassem Gamal Hanash Qasem, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028279 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Teknik penyembunyian fingerprint honeypot maya(honeyd) dari penggodam ent://SD_ILS/0/SD_ILS:787567 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yanti Munirah Jusoh , author<br/>Author&#160;Yanti Munirah Jusoh , author<br/>Format:&#160;Books<br/>Call Number&#160;CP 082471 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Penyembunyian maklumat rahsia menggunakan teknik kod ruang istimewa dalam aplikasi mel elektronik ent://SD_ILS/0/SD_ILS:788113 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nor Amira Nor Azhan, author<br/>Author&#160;Nor Amira Nor Azhan, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.73 N673 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Penyembunyian maklumat rahsia menggunakan teknik kod ruang istimewa dalam aplikasi mel elektronik ent://SD_ILS/0/SD_ILS:788119 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nor Amira Nor Azhan, author<br/>Author&#160;Nor Amira Nor Azhan, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058363 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Least significant bit image steganography using particle swarm optimization and optical pixel adjustment ent://SD_ILS/0/SD_ILS:790280 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Parisa Gerami, 1994-<br/>Author&#160;Parisa Gerami, 1994-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027550 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Elements for privacy policy in E-Commerce based on higher education perspective ent://SD_ILS/0/SD_ILS:793175 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Afiqah Ahmad Said, 1986-<br/>Author&#160;Afiqah Ahmad Said, 1986-,&#160;Ab. Razak Che Hussin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A354 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/> FSKSM UTM information security governance framework ent://SD_ILS/0/SD_ILS:793144 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Amir Haziq Loh Bojeng, 1986-<br/>Author&#160;Amir Haziq Loh Bojeng, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028362 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Email header forgery detection mechanism ent://SD_ILS/0/SD_ILS:793146 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Adnan Abdirahman Adami, 1984-<br/>Author&#160;Adnan Abdirahman Adami, 1984-,&#160;Shukur Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A36 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> A study on hazard risk governance framework in FSKSM UTM Skudai ent://SD_ILS/0/SD_ILS:793188 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Amalina Farhan Kamaruddin, 1985-<br/>Author&#160;Amalina Farhan Kamaruddin, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028119 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Measuring information security awareness level in public organization ent://SD_ILS/0/SD_ILS:793192 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Doaa Saleh Abobakar Baras, 1987-<br/>Author&#160;Doaa Saleh Abobakar Baras, 1987-,&#160;Mohd. Aizaini Maarof, supervisor<br/>Format:&#160;Books<br/>Call Number&#160;CP 028361 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Email header forgery detection mechanism ent://SD_ILS/0/SD_ILS:793163 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Adnan Abdirahman Adami, 1984-<br/>Author&#160;Adnan Abdirahman Adami, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028360 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security and awareness metrics measurement ent://SD_ILS/0/SD_ILS:793262 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Suzlily Abd. Hakim, 1986-<br/>Author&#160;Suzlily Abd. Hakim, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S895 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security and awareness metrics measurement ent://SD_ILS/0/SD_ILS:793263 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Suzlily Abd. Hakim, 1986-<br/>Author&#160;Suzlily Abd. Hakim, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028847 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Image steganography using least significant bit approach enhanced with compression and encryption ent://SD_ILS/0/SD_ILS:793264 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Morteza Bashardoost, 1983-<br/>Author&#160;Morteza Bashardoost, 1983-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M67 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Image steganography using least significant bit approach enhanced with compression and encryption ent://SD_ILS/0/SD_ILS:793265 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Morteza Bashardoost, 1983-<br/>Author&#160;Morteza Bashardoost, 1983-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028728 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud computing ent://SD_ILS/0/SD_ILS:835027 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Muhammad Fisal Zakaria<br/>Author&#160;Muhammad Fisal Zakaria,&#160;Shanmugam, Bharani, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 M84 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud comptuing ent://SD_ILS/0/SD_ILS:835028 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Muhammad Fisal Zakaria<br/>Author&#160;Muhammad Fisal Zakaria,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;CP 033572 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Information security behaviours in enhancing awareness ent://SD_ILS/0/SD_ILS:837590 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sasan Karami Zadeh<br/>Author&#160;Sasan Karami Zadeh,&#160;Zuraini Ismail, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S273 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness framework among clerical staff in islamic religious council ent://SD_ILS/0/SD_ILS:837685 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd Talhah Anuar<br/>Author&#160;Mohd Talhah Anuar,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6438 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness framework among clerical staff in islamic religious council ent://SD_ILS/0/SD_ILS:837686 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohd Talhah Anuar<br/>Author&#160;Mohd Talhah Anuar<br/>Format:&#160;Books<br/>Call Number&#160;CP 034141 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Standard operating procedure for tape recording and handling taped evidence in Malaysian anti corruption commision investigation ent://SD_ILS/0/SD_ILS:837840 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Raub Ghani<br/>Author&#160;Raub Ghani,&#160;Azizah Abdul Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R383 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Standard operating procedure for tape recording and handling taped evidence in Malaysian anti corruption commision investigation ent://SD_ILS/0/SD_ILS:837841 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Raub Ghani<br/>Author&#160;Raub Ghani<br/>Format:&#160;Books<br/>Call Number&#160;CP 034146 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Principles of information security ent://SD_ILS/0/SD_ILS:838004 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W34 2012<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Course Technology,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781111138219<br/> An anti-malvertising model for university students to increase security awareness ent://SD_ILS/0/SD_ILS:840295 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Noorlaily Izwana Ibrahim<br/>Author&#160;Noorlaily Izwana Ibrahim,&#160;Mazdak Zamani, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 N66 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security behaviours in enhancing awareness ent://SD_ILS/0/SD_ILS:837592 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Sasan Karami Zadeh<br/>Author&#160;Sasan Karami Zadeh<br/>Format:&#160;Books<br/>Call Number&#160;CP 034152 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> An anti-malvertising model for university students to increase security awareness ent://SD_ILS/0/SD_ILS:840296 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Noorlaily Izwana Ibrahim<br/>Author&#160;Noorlaily Izwana Ibrahim<br/>Format:&#160;Books<br/>Call Number&#160;CP 033979 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Analyzing security behaviour in managing passwords among staffs of community colleges ent://SD_ILS/0/SD_ILS:840505 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Hazila Hasan, 1981-<br/>Author&#160;Hazila Hasan, 1981-,&#160;Mohd. Shahidan Abdullah, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H396 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:748817 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Winkler, J. R. (Joachim R.)<br/>Author&#160;Winkler, J. R. (Joachim R.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 W56 2011<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495929<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:750220 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Dua, Sumeet<br/>Author&#160;Dua, Sumeet,&#160;Du, Xian<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 D83 2011<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439839423<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:764154 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jang, Michael H.<br/>Author&#160;Jang, Michael H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 J366 2011<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780763791896<br/> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:799110 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Author&#160;Engebretson, Pat (Patrick Henry), 1974-,&#160;Broad, James<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E54 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496551<br/> Software engineering for secure systems : industrial and research perspectives ent://SD_ILS/0/SD_ILS:801907 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mouratidis, Haralambos, 1977-<br/>Author&#160;Mouratidis, Haralambos, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S6537 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781615208371&#160;9781615208388<br/> Windows registry forensics advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:813367 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Carvey, Harlan<br/>Author&#160;Carvey, Harlan<br/>Format:&#160;Books<br/>Call Number&#160;CP 030880<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> Information assurance and security ethics in complex systems : interdisciplinary perspectives ent://SD_ILS/0/SD_ILS:630427 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Dark, Melissa Jane, 1961-<br/>Author&#160;Dark, Melissa Jane, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I545 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781616922450&#160;9781616922467<br/> Hacking exposed : web applications : web application security secrets and solutions ent://SD_ILS/0/SD_ILS:643191 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Scambray, Joel<br/>Author&#160;Scambray, Joel,&#160;Liu, Vincent,&#160;Sima, Caleb<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S324 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill Companies,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071740647<br/> Gray hat hacking : the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:643947 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Harris, Shon<br/>Author&#160;Harris, Shon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G724 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071742559<br/> Physical-layer security : from information theory to security engineering ent://SD_ILS/0/SD_ILS:802330 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Bloch, Matthieu, 1981-<br/>Author&#160;Bloch, Matthieu, 1981-,&#160;Barros, Joao<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B574 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521516501<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:807356 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Goodrich, Michael T.<br/>Author&#160;Goodrich, Michael T.,&#160;Tamassia, Roberto, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G66 2011<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780321512949<br/> Malware forensic field guide for windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:748807 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Malin, Cameron H.<br/>Author&#160;Malin, Cameron H.,&#160;Casey, Eoghan,&#160;Aquilina, James M<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 M322 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597494724<br/> Enhanced SVD watermarking algorithms ent://SD_ILS/0/SD_ILS:756607 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Iman Omidvar Tehrani<br/>Author&#160;Iman Omidvar Tehrani,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I43 2011 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Enhanced SVD watermarking algorithms ent://SD_ILS/0/SD_ILS:756608 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Iman Omidvar Tehrani<br/>Author&#160;Iman Omidvar Tehrani,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 025519 ra<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Adaptive color image watermarking wavelet transform ent://SD_ILS/0/SD_ILS:756714 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohammed Ibrahim Said<br/>Author&#160;Mohammed Ibrahim Said,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M643 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2011<br/> Adaptive color image watermarking wavelet transform ent://SD_ILS/0/SD_ILS:756722 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohammed Ibrahim Said<br/>Author&#160;Mohammed Ibrahim Said,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 025215 ra<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2011<br/> Computer security ent://SD_ILS/0/SD_ILS:756730 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470741153<br/> Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:758506 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ligh, Michael Hale<br/>Author&#160;Ligh, Michael Hale<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M353 2011<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470613030<br/> A guide to kernel exploitation : attacking the core ent://SD_ILS/0/SD_ILS:758745 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Perla, Enrico<br/>Author&#160;Perla, Enrico,&#160;Massimiliano, Oldani<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 P568 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597494861<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:758778 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Metula, Erez<br/>Author&#160;Metula, Erez<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M487 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495745<br/> IT auditing : using controls to protect information assets ent://SD_ILS/0/SD_ILS:761290 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Davis, Chris (Christopher Michael)<br/>Author&#160;Davis, Chris (Christopher Michael),&#160;Schiller, Mike,&#160;Wheeler, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A93 D38 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071742382<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:778300 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Campagna, Rich R.<br/>Author&#160;Campagna, Rich R.,&#160;Iyer, Sibbu,&#160;Krishnan, Ashwin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C364 2011<br/>Publisher&#160;Wiley Pubishing, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470927533<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:758256 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S713 2011<br/>Edition&#160;5th ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136097044<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:758605 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Solomon, Michael, (Michael G.), 1963-<br/>Author&#160;Solomon, Michael, (Michael G.), 1963-,&#160;Rudolph, K.,&#160;Tittel, Ed.,&#160;Broom, Neil,&#160;Barrett, Diane<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S656 2011<br/>Edition&#160;Second edition.<br/>Publisher&#160;Wiley Publishing, Inc.<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470931660<br/> Security 2020 : reduce security risks this decade ent://SD_ILS/0/SD_ILS:758608 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Howard, Doug<br/>Author&#160;Howard, Doug,&#160;Prince, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H6976 2011<br/>Edition&#160;1st ed.<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470639559<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:758726 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Carvey, Harlan A.<br/>Author&#160;Carvey, Harlan A.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C373 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495806<br/> Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)- ent://SD_ILS/0/SD_ILS:758794 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Heiderich, Mario<br/>Author&#160;Heiderich, Mario<br/>Format:&#160;Books<br/>Call Number&#160;QA76.625 H46 2011<br/>Publisher&#160;Elsevier/Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496049<br/> Securing SQL server : protecting your database from attackers ent://SD_ILS/0/SD_ILS:758811 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Cherry, Denny<br/>Author&#160;Cherry, Denny,&#160;Larock, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.S67 C478 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496254<br/> Information security : principles and practice ent://SD_ILS/0/SD_ILS:779250 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stamp, Mark<br/>Author&#160;Stamp, Mark<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S75 2011<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470626399<br/> Roadmap to information security : for IT and InfoSec managers ent://SD_ILS/0/SD_ILS:781102 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Whitman, Michael E.<br/>Author&#160;Whitman, Michael E.,&#160;Mattord, Herbert J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W45 2011<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781435480308<br/> Introduction to security and network forensics ent://SD_ILS/0/SD_ILS:785073 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Buchanan, William J.<br/>Author&#160;Buchanan, William J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B824 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780849335686<br/> Cyber security, cyber crime and cyber forensics : applications and perspectives ent://SD_ILS/0/SD_ILS:772977 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Santanam, Raghu, 1969-<br/>Author&#160;Santanam, Raghu, 1969-,&#160;Sethumadhavan, M., 1966-,&#160;Virendra, Mohit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C93 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781609601232&#160;9781609601256<br/> Malware analyst's cookbook and DVD tools and techniques for fighting malicious code ent://SD_ILS/0/SD_ILS:774305 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Ligh, Michael Hale<br/>Author&#160;Ligh, Michael Hale<br/>Format:&#160;Books<br/>Call Number&#160;CP 025051<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;978KPART19400 (dvd.)<br/> Online consecutive secure multi-party computation algorithm for preserving privacy ent://SD_ILS/0/SD_ILS:776267 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdolreza Rasouli Kenari, 1979-<br/>Author&#160;Abdolreza Rasouli Kenari, 1979-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A23 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Online consecutive secure multi-party computation algorithm for preserving privacy ent://SD_ILS/0/SD_ILS:777861 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Abdolreza Rasouli Kenari<br/>Author&#160;Abdolreza Rasouli Kenari<br/>Format:&#160;Books<br/>Call Number&#160;CP 028869 ra<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Intrusion detection : a machine learning approach ent://SD_ILS/0/SD_ILS:780736 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Yu, Zhenwei<br/>Author&#160;Yu, Zhenwei,&#160;Tsai, Jeffrey J. P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y89 2011<br/>Publisher&#160;Imperial College Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781848164475<br/> Information security evaluation : a holistic approach ent://SD_ILS/0/SD_ILS:781151 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Tashi, Igli<br/>Author&#160;Tashi, Igli,&#160;Ghernaouti-Helie, Solange<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T374 2011<br/>Publisher&#160;EFPL Pr.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439879153<br/> Mycrypttools cryptographic algorithm learning aid ent://SD_ILS/0/SD_ILS:787675 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nelmiawati, author<br/>Author&#160;Nelmiawati, author,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;Z103 N45 2011 raf<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Mycrypttools cryptographic algorithm learning aid ent://SD_ILS/0/SD_ILS:787676 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nelmiawati, author,<br/>Author&#160;Nelmiawati, author,<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058333 ra<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Introduction to cryptography with open-source software ent://SD_ILS/0/SD_ILS:789125 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;McAndrew, Alasdair<br/>Author&#160;McAndrew, Alasdair<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 M398 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439825709<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:789134 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mena, Jesus.<br/>Author&#160;Mena, Jesus.<br/>Format:&#160;Books<br/>Call Number&#160;HV8073 M395 2011<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439860694<br/> Network security essentials : applications and standards ent://SD_ILS/0/SD_ILS:377761 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Stallings, William<br/>Author&#160;Stallings, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S72 2011<br/>Edition&#160;4th ed.<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780136108054<br/> Information security risk management awareness in e-government outsourced projects ent://SD_ILS/0/SD_ILS:836020 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Zalehah Muyet<br/>Author&#160;Zalehah Muyet,&#160;Zuraini Ismail,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z354 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2011<br/> The basics of information security : understanding the fundamentals of InfoSec in theory and practice ent://SD_ILS/0/SD_ILS:838401 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Andress, Jason<br/>Author&#160;Andress, Jason,&#160;Rogers, Russ, editor<br/>Format:&#160;Computer file<br/>Call Number&#160;QA76.9.A25 A535 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496537<br/> Computer security : protecting digital resources ent://SD_ILS/0/SD_ILS:374669 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Newman, Robert C.<br/>Author&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 N48 2010<br/>Publisher&#160;Jones &amp; Bartlett Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763759940<br/> The effects of windows service packs on port scanning ent://SD_ILS/0/SD_ILS:604098 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Wan Mohd. Said Wan Othman, 1966-<br/>Author&#160;Wan Mohd. Said Wan Othman, 1966-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 020835 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Analysis of effectiveness of honeypots in tracking botnets ent://SD_ILS/0/SD_ILS:604102 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Mohammad Jorjor Zadeh Shooshtari, 1974-<br/>Author&#160;Mohammad Jorjor Zadeh Shooshtari, 1974-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019852 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Hashing in computer science : fifty years of slicing and dicing ent://SD_ILS/0/SD_ILS:639636 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.H36 K65 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780470344736<br/> Safety of computer architectures ent://SD_ILS/0/SD_ILS:639717 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Boulanger, Jean-Louis<br/>Author&#160;Boulanger, Jean-Louis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 S244 2010<br/>Publisher&#160;ISTE ;<br/>Publication Date&#160;2010<br/>ISBN&#160;9781848211971<br/> Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:640462 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Lillard, Terrence V.<br/>Author&#160;Lillard, Terrence V.,&#160;Lillard, Terrence<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D54 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495370<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:736304 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Raghavan, Lakshmikanth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76 .D47 M466 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439826966<br/> Guide to computer forensics and investigations[electronic resource] ent://SD_ILS/0/SD_ILS:736368 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill,&#160;Philips, Amelia,&#160;Steuart, Chris<br/>Format:&#160;Books<br/>Call Number&#160;CP 023512<br/>Edition&#160;4th Ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2010&#160;2009<br/>ISBN&#160;9781435498839<br/> File encryption system with digital signature for secure data transfer ent://SD_ILS/0/SD_ILS:764278 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Muhammad Fauzan Ariffin, 1985-<br/>Author&#160;Muhammad Fauzan Ariffin, 1985-,&#160;Ahmad Zuri Sha'ameri,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;XX(764278.2)<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Information security risk analysis ent://SD_ILS/0/SD_ILS:804270 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P445 2010<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439839560<br/> Guide to computer forensics and investigations ent://SD_ILS/0/SD_ILS:624345 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Nelson, Bill<br/>Author&#160;Nelson, Bill,&#160;Philips, Amelia,&#160;Steuart, Chris<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 G85 2010<br/>Edition&#160;4th Ed.<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2010&#160;2009<br/>ISBN&#160;9781435498839<br/> Risk analysis and security countermeasure selection ent://SD_ILS/0/SD_ILS:625845 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Norman, Thomas L.<br/>Author&#160;Norman, Thomas L.<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N67 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781420078701<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Relation based access control ent://SD_ILS/0/SD_ILS:637823 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Zhang, Rui<br/>Author&#160;Zhang, Rui<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z43 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9783898386265<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:640346 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Trinckes, John J.<br/>Author&#160;Trinckes, John J.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T75 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439810071<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:640492 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Fried, Stephen, 1962-<br/>Author&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F75 2010<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439820162<br/> Hybrid detection technique for databases intrusion using SQL injection and insider misuse data ent://SD_ILS/0/SD_ILS:731307 2024-04-23T13:44:54Z 2024-04-23T13:44:54Z by&#160;Aziah Asmawi, 1981-<br/>Author&#160;Aziah Asmawi, 1981-,&#160;Zailani Mohamed Sidek, supervisor,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A95 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>