Search Results for - Narrowed by: Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list2024-04-23T13:44:54ZComputer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-04-23T13:44:54Z2024-04-23T13:44:54Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Cybersecurity Analyticsent://SD_ILS/0/SD_ILS:8872462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Verma, Rakesh M., author<br/>Author Verma, Rakesh M., author, Marchette, David J., author<br/>Format: Books<br/>Call Number QA76.9.A25 V47 2020<br/>Publication Date 2020<br/>ISBN 9780367346010<br/>CYBER INFLUENCE AND COGNITIVE THREATSent://SD_ILS/0/SD_ILS:8879352024-04-23T13:44:54Z2024-04-23T13:44:54Zby Benson, Vladlena, editor<br/>Author Benson, Vladlena, editor, McAlaney, John, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C933 2020<br/>Publication Date 2020<br/>ISBN 9780128192047<br/>Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectivesent://SD_ILS/0/SD_ILS:8823242024-04-23T13:44:54Z2024-04-23T13:44:54Zby Gupta, Brij, Dr., 1982-, editor<br/>Author Gupta, Brij, Dr., 1982-, editor, Agrawal, Dharma P., Dr., editor, Wang, Haoxiang, Dr., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C668 2019<br/>Publication Date 2019<br/>ISBN 9780815371335<br/>GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONSent://SD_ILS/0/SD_ILS:8881522024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nelson, Bill, author<br/>Author Nelson, Bill, author, Phillips, Amelia, author, Steuart, Christopher, author<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2019<br/>Edition Sixth edition<br/>Publication Date 2019<br/>ISBN 9781337568944<br/>Automated image based CAPTCHA Solverent://SD_ILS/0/SD_ILS:8703602024-04-23T13:44:54Z2024-04-23T13:44:54Zby Choong, Kai Bin, 1993-, author<br/>Author Choong, Kai Bin, 1993-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 C466 2018 raf<br/>Publication Date 2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:8732292024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ciampa, Mark D., author<br/>Author Ciampa, Mark D., author<br/>Format: Books<br/>Call Number TK5105.59 C574 2018<br/>Edition Sixth edition<br/>Publication Date 2018<br/>ISBN 9781337288781<br/>Automated image based CAPTCHA Solverent://SD_ILS/0/SD_ILS:8703632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Choong, Kai Bin, 1993-, author<br/>Author Choong, Kai Bin, 1993-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 265430 ra<br/>Publication Date 2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/>CYBERSECURITY ESSENTIALSent://SD_ILS/0/SD_ILS:8823362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Brooks, Charles J., author<br/>Author Brooks, Charles J., author, Grow, Christophe, author, Craig, Philip, author, Short, Donald, author<br/>Format: Books<br/>Call Number TK5105.59 B76 2018<br/>Publication Date 2018<br/>ISBN 9781119362395<br/>Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterpriseent://SD_ILS/0/SD_ILS:8872562024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sachowski, Jason, author<br/>Author Sachowski, Jason, author<br/>Format: Books<br/>Call Number HV8079.C65 S23 2018<br/>Publication Date 2018<br/>ISBN 9781138720930<br/>Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategiesent://SD_ILS/0/SD_ILS:8732362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Winkler, Ira, author<br/>Author Winkler, Ira, author, Gomes, Araceli Treu, author, Shackleford, Dave, editor<br/>Format: Books<br/>Call Number TK5105.59 W56 2017<br/>Publication Date 2017<br/>ISBN 9780128093160<br/>Malaysia Perlu Pakar Serangan Untuk Keselamatan Sistem Komputerent://SD_ILS/0/SD_ILS:8748302024-04-23T13:44:54Z2024-04-23T13:44:54Zby Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Author Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Format: Visual Materials<br/>Call Number CP 080656 a<br/>Publication Date 2017<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:8410372024-04-23T13:44:54Z2024-04-23T13:44:54Zby Knapp, Eric D.<br/>Author Knapp, Eric D., Langill, Joel Thomas<br/>Format: Books<br/>Call Number TS156.8 K53 2015<br/>Edition 2nd ed.<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780124201149<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8593692024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 I27 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A Model Of Security Awareness In Cloud Computingent://SD_ILS/0/SD_ILS:8593722024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdul Ghafar Jaafar, 1985-, author<br/>Author Abdul Ghafar Jaafar, 1985-, author, Rasimah Che Mohd. Yusoff, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.585 A238 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8595642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034727 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8598942024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A366 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Detection of spam on feature selection using cuckoo's search algorithment://SD_ILS/0/SD_ILS:8607362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Maznif Arahin Mujail, 1991-, author<br/>Author Maznif Arahin Mujail, 1991-, author, Anazida Zainal, Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number XX(860736.1)<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Detection of spam on feature selection using cuckoo's search algorithment://SD_ILS/0/SD_ILS:8607372024-04-23T13:44:54Z2024-04-23T13:44:54Zby Maznif Arahin Mujail, 1991-, author<br/>Author Maznif Arahin Mujail, 1991-, author, Anazida Zainal, Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061247 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Pervasive Computing and Communications. Part II : QOS & SECURITYent://SD_ILS/0/SD_ILS:8647142024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yahaya Coulibaly, editor<br/>Author Yahaya Coulibaly, editor, Mohammad Abdur Razzaque, editor, Adekemi Adedokun, contributor, Chong, Yuh Chwen, contributor, Fauziah Abdul Razak, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 P473 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835210501<br/>SECURITY IN COMPUTING & NETWORKING. PART IIent://SD_ILS/0/SD_ILS:8658392024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, Hassan Chizari, 1975-, contributor, Mahnoush Babaeizadeh, 1988-, contributor, Majid Bakhtiari, 1961-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S439 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835211515<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:8358552024-04-23T13:44:54Z2024-04-23T13:44:54Zby Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>Web security : a WhiteHat perspectiveent://SD_ILS/0/SD_ILS:8358692024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>Information security : principles and new conceptsent://SD_ILS/0/SD_ILS:8370582024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>Integrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:8372192024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mukhopadhyay, Debdeep, author<br/>Author Mukhopadhyay, Debdeep, author, Chakraborty, Rajat Subhra, author<br/>Format: Books<br/>Call Number QA76.9.A25 M85 2015<br/>Publisher CRC Press,<br/>Publication Date 2015<br/>ISBN 9781439895832<br/>Designing and building security operations centerent://SD_ILS/0/SD_ILS:8383652024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nathans, David<br/>Author Nathans, David<br/>Format: Books<br/>Call Number HV8290 N38 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128008997<br/>Information security analytics : finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:8383662024-04-23T13:44:54Z2024-04-23T13:44:54Zby Talabis, Mark, author<br/>Author Talabis, Mark, author, McPherson, Robert, author, Miyamoto, I., author, Martin, Jason L., author<br/>Format: Books<br/>Call Number QA76.9.A25 T355 2015<br/>Publisher Syngress,<br/>Publication Date 2015<br/>ISBN 9780128002070<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:8391282024-04-23T13:44:54Z2024-04-23T13:44:54Zby Gibson, Darril, author<br/>Author Gibson, Darril, author<br/>Format: Books<br/>Call Number QA76.9.A25 G53 2015<br/>Edition Second edition<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055955<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-04-23T13:44:54Z2024-04-23T13:44:54Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohamad Roshidi Rozali, 1980-, author<br/>Author Mohamad Roshidi Rozali, 1980-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 M64 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohamad Roshidi Rozali, 1980-<br/>Author Mohamad Roshidi Rozali, 1980-, Zuraini Ismai, author?UNAUTHORIZED, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034749 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A model of security awareness in cloud computingent://SD_ILS/0/SD_ILS:8596452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdul Ghafar Jaafar, 1985-, author<br/>Author Abdul Ghafar Jaafar, 1985-, author, Rasimah Che Mohd. Yusoff, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034746 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 Y46 2015 raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603372024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061137 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8607842024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034789 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>SECURITY IN COMPUTING & NETWORKING. PART 1ent://SD_ILS/0/SD_ILS:8643802024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, A. Ahmed Ibrahim Alkilary, contributor, Affandi Husain, contributor, Hassan Chizari, 1975-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S438 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 35000000012313<br/>Guide to network defense and countermeasuresent://SD_ILS/0/SD_ILS:8225862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Weaver, Randy, author<br/>Author Weaver, Randy, author, Weaver, Dawn, author, Farwood, Dean, author<br/>Format: Books<br/>Call Number TK5105.59 W424 2014<br/>Edition Third edition<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781133727941<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8254882024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.76.C68 M64 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Hands-on information security lab manualent://SD_ILS/0/SD_ILS:8282872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author, Green, Andrew, author<br/>Format: Books<br/>Call Number HD30.38 W45 2014 f<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781285167572<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:8312392024-04-23T13:44:54Z2024-04-23T13:44:54Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C934 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166813<br/>Simplified computer incident response model for premium pension limited Nigeriaent://SD_ILS/0/SD_ILS:8433642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abubakar Mohammed, 1989-<br/>Author Abubakar Mohammed, 1989-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 051607 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/>Improvement scalar multiplication in elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8434142024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sui, Tao, 1988- author<br/>Author Sui, Tao, 1988- author, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S85 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Improvement scalar multiplication in elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8434182024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sui, Tao, 1988- author<br/>Author Sui, Tao, 1988- author<br/>Format: Books<br/>Call Number CP 052054 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/>Preferred methodologies of penetration testing from information security professionals perspectiveent://SD_ILS/0/SD_ILS:8439022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Irzani Wahid, 1985-, author<br/>Author Mohd. Irzani Wahid, 1985-, author, Bharanidharan Shanmugam, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6439 2014 raf<br/>Publication Date 2014<br/>Thesis Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/>Success factors for ISMS self-implementationent://SD_ILS/0/SD_ILS:8442772024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norrjan Mohd Mustapha, author<br/>Author Norrjan Mohd Mustapha, author, Nurazean Maarop, supervisor<br/>Format: Books<br/>Call Number CP 034536 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Information Assurance)) - Universiti Teknologi Malaysia, 2014<br/>Security management : a critical thinking approachent://SD_ILS/0/SD_ILS:8041862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Land, Michael<br/>Author Land, Michael, Ricks, Truett, Rocks, Bobby<br/>Format: Books<br/>Call Number HD61.51 L36 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466561779<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-04-23T13:44:54Z2024-04-23T13:44:54Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Cryptography for security and privacy in cloud computingent://SD_ILS/0/SD_ILS:8140262024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rass, Stefan<br/>Author Rass, Stefan, Slamanig, Daniel, author<br/>Format: Books<br/>Call Number QA76.9.A25 R37 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608075751<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:8211522024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2014<br/>Edition 6th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014 2011<br/>ISBN 9780133354690<br/>Network security essentials applications and standardsent://SD_ILS/0/SD_ILS:8212202024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S725 2014<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2014<br/>ISBN 9780133370430<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:8213652024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stapleton, J. J. (Jeffrey James)<br/>Author Stapleton, J. J. (Jeffrey James)<br/>Format: Books<br/>Call Number QA76.9.A25 S84 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466592148<br/>A secure authentication method for NFC tags on smart postersent://SD_ILS/0/SD_ILS:8309582024-04-23T13:44:54Z2024-04-23T13:44:54Zby Halalzadeh, Ababasali<br/>Author Halalzadeh, Ababasali, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number HF5416 H35 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Evaluating digital forensic practices for money laundering in financial institutionent://SD_ILS/0/SD_ILS:8310832024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jamilah Ahmad, 1982-, author<br/>Author Jamilah Ahmad, 1982-, author, Mohd. Shahidan Abdullah, 1960-, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number HV6768 J36 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Evaluating digital forensic practices for money laundering in financial institutionent://SD_ILS/0/SD_ILS:8310842024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jamilah Ahmad, 1982-, author<br/>Author Jamilah Ahmad, 1982-, author<br/>Format: Books<br/>Call Number CP 033620 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310962024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A284 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310972024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034198 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>An improved SQL injection detection model in signature based IDS using tree structureent://SD_ILS/0/SD_ILS:8310982024-04-23T13:44:54Z2024-04-23T13:44:54Zby Amirmohammad Sadeghian, 1987- , author<br/>Author Amirmohammad Sadeghian, 1987- , author, Mazdak Zamani, 1979- , supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 S236 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>An enhancement of traceability model based-on scenario for digital forensic investigationent://SD_ILS/0/SD_ILS:8311092024-04-23T13:44:54Z2024-04-23T13:44:54Zby Iman Ahmeid Mohamed, 1992-, author<br/>Author Iman Ahmeid Mohamed, 1992-, author, Azizah Abd. Manaf, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number HV8079.C65 I43 2014 raf<br/>Publication Date 2014<br/>Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/>An enhancement of traceability model based-on scenario for digital forensic investigationent://SD_ILS/0/SD_ILS:8311102024-04-23T13:44:54Z2024-04-23T13:44:54Zby Iman Ahmeid Mohamed, 1992-, author<br/>Author Iman Ahmeid Mohamed, 1992-, author, Azizah Abd. Manaf, supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034188 ra<br/>Publication Date 2014<br/>Sarjana Sains (Jaminan Maklumat)- Universiti Teknologi Malaysia, 2014<br/>Analysis of user awareness on phishing attempt among studentent://SD_ILS/0/SD_ILS:8311172024-04-23T13:44:54Z2024-04-23T13:44:54Zby Vanisri Nagalingam<br/>Author Vanisri Nagalingam, Ganthan Narayana Samy, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 V36 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Analysis of user awareness on phishing attempt among studentent://SD_ILS/0/SD_ILS:8311192024-04-23T13:44:54Z2024-04-23T13:44:54Zby Vanisri Nagalingam<br/>Author Vanisri Nagalingam, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033629 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Komputer Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Improved implementation of digital watermarking techniquesent://SD_ILS/0/SD_ILS:8240282024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmed Sabeeh Yousif, 1986-<br/>Author Ahmed Sabeeh Yousif, 1986-, Zaid Omar, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 A365 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik-Mikroelektronik & Sistem Komputer )) - Universiti Teknologi Malaysia, 2014<br/>Improved implementation of digital watermarking techniquesent://SD_ILS/0/SD_ILS:8240302024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmed Sabeeh Yousif, 1986-<br/>Author Ahmed Sabeeh Yousif, 1986-<br/>Format: Books<br/>Call Number CP 032687 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Kejuruteraan (Elektrik-Mikroelektronik & Sistem Komputer )) - Universiti Teknologi Malaysia, 2014<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8255332024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin<br/>Format: Books<br/>Call Number CP 050530 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259202024-04-23T13:44:54Z2024-04-23T13:44:54Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 W33 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259252024-04-23T13:44:54Z2024-04-23T13:44:54Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman<br/>Format: Books<br/>Call Number CP 050841 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Applied network security monitoring : collection, detection, and analysisent://SD_ILS/0/SD_ILS:8284382024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sanders, Chris, 1986-<br/>Author Sanders, Chris, 1986-, Smith, Jason (Adjunct associate professor), author<br/>Format: Books<br/>Call Number QA76.9.A25 S264 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124172081<br/>Security for service oriented architecturesent://SD_ILS/0/SD_ILS:8372132024-04-23T13:44:54Z2024-04-23T13:44:54Zby Williams, Walter, author<br/>Author Williams, Walter, author<br/>Format: Books<br/>Call Number TK5105.5828 W55 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466584020<br/>Core software security : security at the sourceent://SD_ILS/0/SD_ILS:8372162024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ransome, James F., author<br/>Author Ransome, James F., author, Misra, Anmol, author, Schoenfield, Brook, author<br/>Format: Books<br/>Call Number QA76.9.A25 R364 2014<br/>Publisher Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466560956<br/>The science and technology of counterterrorism : measuring physical and electronic security riskent://SD_ILS/0/SD_ILS:8381452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Young, Carl S., author<br/>Author Young, Carl S., author<br/>Format: Books<br/>Call Number HV6431 Y68 2014<br/>Publication Date 2014<br/>ISBN 9780124200562<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:8383882024-04-23T13:44:54Z2024-04-23T13:44:54Zby Andress, Jason<br/>Author Andress, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 A535 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier/Syngress, Syngress is a imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128007440<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-04-23T13:44:54Z2024-04-23T13:44:54Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Analyzing security, trust, and crime in the digital worldent://SD_ILS/0/SD_ILS:8412042024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nemati, Hamid R., 1958- editor<br/>Author Nemati, Hamid R., 1958- editor<br/>Format: Books<br/>Call Number HF5548.37 A53 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466648562<br/>Organizational, legal, and technological dimensions of information system administrationent://SD_ILS/0/SD_ILS:8412122024-04-23T13:44:54Z2024-04-23T13:44:54Zby Portela, Irene Maria, 1965-, editor<br/>Author Portela, Irene Maria, 1965-, editor, Almeida, Fernando, 1979-, editor<br/>Format: Books<br/>Call Number T58.64 O74 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466645264<br/>Simplified computer incident response model for premium pension limited Nigeriaent://SD_ILS/0/SD_ILS:8433592024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abubakar Mohammed, 1989- author<br/>Author Abubakar Mohammed, 1989- author, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A283 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/>Preferred methodologies of penetration testing from information security professionals perspectiveent://SD_ILS/0/SD_ILS:8439032024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Irzani Wahid, 1985-, author<br/>Author Mohd. Irzani Wahid, 1985-, author<br/>Format: Books<br/>Call Number CP 034209 ra<br/>Publication Date 2014<br/>Thesis Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/>Success factors for ISMS self-implementationent://SD_ILS/0/SD_ILS:8442762024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norrjan Mohd Mustapha, author<br/>Author Norrjan Mohd Mustapha, author, Nurazean Maarop, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 N677 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Information Assurance)) - Universiti Teknologi Malaysia, 2014<br/>Cloud management and securityent://SD_ILS/0/SD_ILS:8355702024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abbadi, Imad M., author<br/>Author Abbadi, Imad M., author<br/>Format: Books<br/>Call Number QA76.585 A235 2014<br/>Publisher Wiley,<br/>Publication Date 2014<br/>ISBN 9781118817094<br/>A cryptography primer : secrets and promisesent://SD_ILS/0/SD_ILS:8358482024-04-23T13:44:54Z2024-04-23T13:44:54Zby Klein, Philip N., author<br/>Author Klein, Philip N., author<br/>Format: Books<br/>Call Number QA76.9.A25 K545 2014<br/>Publisher Cambridge University Press,<br/>Publication Date 2014<br/>ISBN 9781107017887<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:8372822024-04-23T13:44:54Z2024-04-23T13:44:54Zby DeFranco, Joanna F author<br/>Author DeFranco, Joanna F author<br/>Format: Books<br/>Call Number TK5105.59 D44 2013<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781466564527<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-04-23T13:44:54Z2024-04-23T13:44:54Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:8379442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ligh, Michael Hale, author<br/>Author Ligh, Michael Hale, author, Case, Andrew, author, Levy, Jamie, author, Walters, Aaron, author<br/>Format: Books<br/>Call Number QA76.9.A25 L54 2014<br/>Publication Date 2014<br/>ISBN 9781118825099<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:8380732024-04-23T13:44:54Z2024-04-23T13:44:54Zby Messier, Ric, author<br/>Author Messier, Ric, author, Konar, Allan, editor<br/>Format: Books<br/>Call Number QA76.9.A25 M475 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124170407<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-04-23T13:44:54Z2024-04-23T13:44:54Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Engineering safe and secure software systemsent://SD_ILS/0/SD_ILS:7980472024-04-23T13:44:54Z2024-04-23T13:44:54Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2013<br/>Publisher Artech House,<br/>Publication Date 2013<br/>ISBN 9781608074723<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:7995692024-04-23T13:44:54Z2024-04-23T13:44:54Zby Doherty, Eamon P.<br/>Author Doherty, Eamon P.<br/>Format: Books<br/>Call Number HV8079.C65 D64 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439898772<br/>Logical operators and its application in determining vulnerable websites caused by SQL injection among UTM faculty websitesent://SD_ILS/0/SD_ILS:8014972024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nurul Fariha Mokhter, 1989-<br/>Author Nurul Fariha Mokhter, 1989-, Jamalludin Talib, supervisor, Fakulti Sains<br/>Format: Books<br/>Call Number x<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Matematik)) - Universiti Teknologi Malaysia, 2013<br/>An analysis on security awareness of social networks usersent://SD_ILS/0/SD_ILS:8034682024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mahdi Darvishi, 1982-<br/>Author Mahdi Darvishi, 1982-<br/>Format: Books<br/>Call Number CP 029830 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034832024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 J54 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of task oriented maintenance model using secure software desgin maintenenceent://SD_ILS/0/SD_ILS:8035442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Essa Zaki Abdulrazak, 1979-<br/>Author Essa Zaki Abdulrazak, 1979-, Imran Ghani, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.754 E87 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of task oriented maintenance model using secure software desgin maintenenceent://SD_ILS/0/SD_ILS:8035472024-04-23T13:44:54Z2024-04-23T13:44:54Zby Essa Zaki Abdulrazak, 1979-<br/>Author Essa Zaki Abdulrazak, 1979-<br/>Format: Books<br/>Call Number CP 029826 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Supervised machine learning approach for detection of malicious executablesent://SD_ILS/0/SD_ILS:8037682024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yahye Abukar Ahmed, 1986-<br/>Author Yahye Abukar Ahmed, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.76.C68 Y34 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Supervised machine learning approach for detection of malicious executablesent://SD_ILS/0/SD_ILS:8041152024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yahye Abukar Ahmed, 1986-<br/>Author Yahye Abukar Ahmed, 1986-<br/>Format: Books<br/>Call Number CP 029818 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8042882024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Information securityent://SD_ILS/0/SD_ILS:8042932024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rhodes-Ousley, Mark<br/>Author Rhodes-Ousley, Mark<br/>Format: Books<br/>Call Number TK5105.59 R46 2013<br/>Edition 2nd ed.<br/>Publisher McGraw Hill Education,<br/>Publication Date 2013<br/>ISBN 9780071784351<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045062024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdifatah Abdirahman Abdullahi, 1986-<br/>Author Abdifatah Abdirahman Abdullahi, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdifatah Abdirahman Abdullah, 1986- author<br/>Author Abdifatah Abdirahman Abdullah, 1986- author, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 030021 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8045092024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmed A. A. Abunada, 1987-<br/>Author Ahmed A. A. Abunada, 1987-<br/>Format: Books<br/>Call Number CP 029972 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Network and information security : issues, challenges and research trendsent://SD_ILS/0/SD_ILS:8054292024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sarma, Nityananda<br/>Author Sarma, Nityananda, Bhattacharyya, Dhruba K.<br/>Format: Books<br/>Call Number TK5105.59 N484 2013<br/>Publisher Narosa Publishing House,<br/>Publication Date 2013<br/>ISBN 9788184873146<br/>Intelligent systems for security informaticsent://SD_ILS/0/SD_ILS:8056972024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yang, Christopher C.<br/>Author Yang, Christopher C.<br/>Format: Books<br/>Call Number QA76.9.A25 I58 2013<br/>Edition 1st ed.<br/>Publisher Elsevier/Academic Press ; Zhejiang University Press,<br/>Publication Date 2013<br/>ISBN 9780124047020<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8061562024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sayuthi Jaafar, 1962-<br/>Author Sayuthi Jaafar, 1962-<br/>Format: Books<br/>Call Number CP 030475 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-<br/>Format: Books<br/>Call Number CP 030805 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Credential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091062024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norjihan Abdul Ghani, 1977- , author<br/>Author Norjihan Abdul Ghani, 1977- , author, Harihodin Selamat, Zailani Mohamed Sidek, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N676 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>The redundancy-based disaster recovery framework for cloud computingent://SD_ILS/0/SD_ILS:8111942024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sabbaghi, Fatemeh, 1977-<br/>Author Sabbaghi, Fatemeh, 1977-, Siti Hajar Othman, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.585 S23 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>The redundancy-based disaster recovery framework for cloud computingent://SD_ILS/0/SD_ILS:8112022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sabbaghi, Fatemeh, 1977-<br/>Author Sabbaghi, Fatemeh, 1977-<br/>Format: Books<br/>Call Number CP 033053 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114292024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A36 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114322024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-<br/>Format: Books<br/>Call Number CP 031199 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>USB storage authentication, delegation and revocation mechanisms based on multilevel trust modelent://SD_ILS/0/SD_ILS:8115702024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mahboubi, Arash, 1981-<br/>Author Mahboubi, Arash, 1981-<br/>Format: Books<br/>Call Number CP 031143 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Restricted until June 2016<br/>Fasa kesediaan digital forensik bagi kerjaan Negeri Johorent://SD_ILS/0/SD_ILS:8116402024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ruzana Jaffar, 1975-<br/>Author Ruzana Jaffar, 1975-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number HV8079.C65 R89 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Fasa kesediaan digital forensik bagi kerjaan Negeri Johorent://SD_ILS/0/SD_ILS:8116422024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ruzana Jaffar, 1975-<br/>Author Ruzana Jaffar, 1975-<br/>Format: Books<br/>Call Number CP 031182 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamtan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Development of metamodel for information security risk managementent://SD_ILS/0/SD_ILS:8116462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author Mohammed Salem Mohammed Ba Muqabel, 1988-, Siti Hajar Othman, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M648 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116692024-04-23T13:44:54Z2024-04-23T13:44:54Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M379 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116702024-04-23T13:44:54Z2024-04-23T13:44:54Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-<br/>Format: Books<br/>Call Number CP 031190 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>An enhanced performance model for metamorphic computer virus classification and detectionent://SD_ILS/0/SD_ILS:8167522024-04-23T13:44:54Z2024-04-23T13:44:54Zby Basharirad, Babak, 1979- , author<br/>Author Basharirad, Babak, 1979- , author, Maslin Masrom, supervisor, Suhaimi Ibrahim, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 B376 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Safety management for software-based equipmentent://SD_ILS/0/SD_ILS:8186362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Boulanger, Jean-Louis<br/>Author Boulanger, Jean-Louis<br/>Format: Books<br/>Call Number QA76.9.A25 B684 2013<br/>Publisher ISTE Ltd/John Wiley and Sons Inc,<br/>Publication Date 2013<br/>ISBN 9781848214521<br/>An enhancement of succinate and lactate production in escherichia coli with bat algorithment://SD_ILS/0/SD_ILS:8192782024-04-23T13:44:54Z2024-04-23T13:44:54Zby Chua, Pooi San, 1989-, author<br/>Author Chua, Pooi San, 1989-, author<br/>Format: Books<br/>Call Number CP 082576 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Bioinformatik)) – Universiti Teknologi Malaysia, 2013<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:8210622024-04-23T13:44:54Z2024-04-23T13:44:54Zby Gogolin, Greg.<br/>Author Gogolin, Greg.<br/>Format: Books<br/>Call Number HV8079.C65 G64 2013<br/>Publisher Taylor & Francis, CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439874950<br/>Cryptography in C and C++ent://SD_ILS/0/SD_ILS:8292472024-04-23T13:44:54Z2024-04-23T13:44:54Zby Welschenbach, Michael, author<br/>Author Welschenbach, Michael, author<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2013<br/>Edition 2nd ed.<br/>Publisher Apress,<br/>Publication Date 2013<br/>ISBN 9781430250982<br/>An information security awareness model for financial management infiormation system (FMIS) in Sudanent://SD_ILS/0/SD_ILS:8310232024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mahmoud, Suliman Mohamed<br/>Author Mahmoud, Suliman Mohamed, Zuraini Ismail, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 M346 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Cyber crime, security and digital intelligenceent://SD_ILS/0/SD_ILS:8313512024-04-23T13:44:54Z2024-04-23T13:44:54Zby Johnson, Mark, 1959- author<br/>Author Johnson, Mark, 1959- author<br/>Format: Books<br/>Call Number HV6773 J64 2013<br/>Publisher Gower,<br/>Publication Date 2013<br/>ISBN 9781409454496 9781409454502<br/>Logical operators and its application in determining vulnerable webstites caused by SQL injection among UTM faculty websitesent://SD_ILS/0/SD_ILS:8015832024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nurul Fariha Mokhter, 1989-<br/>Author Nurul Fariha Mokhter, 1989-<br/>Format: Books<br/>Call Number CP 029434 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Matematik)) - Universiti Teknologi Malaysia, 2013<br/>Least significant bit steganography technique using modulus operation with pixel selection derived from K-map and Gaussian eliminationent://SD_ILS/0/SD_ILS:8028172024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sayuthi Jaafar, 1962- , author<br/>Author Sayuthi Jaafar, 1962- , author, Azizah Abd. Manaf, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S29 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-<br/>Format: Books<br/>Call Number CP 029824 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>An analysis on security awareness of social networks usersent://SD_ILS/0/SD_ILS:8034632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mahdi Darvishi, 1982-<br/>Author Mahdi Darvishi, 1982-, Imran Ghani, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HM742 M34 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Comparative study between fuzzy C-Means algorithm and artificial immune network algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8045032024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ahmed A. A. Abunada, 1987-<br/>Author Ahmed A. A. Abunada, 1987-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A364 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A gray-scale image steganography techmique using fibonacci 12-bitplane decomposition and LSB approachent://SD_ILS/0/SD_ILS:8044892024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sabah Fadhel Hamood, 1973-<br/>Author Sabah Fadhel Hamood, 1973-<br/>Format: Books<br/>Call Number CP 030220 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Web application defender's cookbook : battling hackers and protecting usersent://SD_ILS/0/SD_ILS:8065072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Barnett, Ryan C.<br/>Author Barnett, Ryan C.<br/>Format: Books<br/>Call Number QA76.9.A25 B377 2013<br/>Edition 1st ed.<br/>Publisher Wiley Pub., Inc.,<br/>Publication Date 2013 2012<br/>ISBN 9781118362181<br/>Color image steganography technique based onleast significant bits approach coupled with Huffman encoding compressionent://SD_ILS/0/SD_ILS:8078852024-04-23T13:44:54Z2024-04-23T13:44:54Zby Eng, Chia Jing, 1989-<br/>Author Eng, Chia Jing, 1989-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5102.94 E54 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Perisian Grafik dan Multimedia)) - Universiti Teknologi Malaysia, 2013<br/>Authentication using gameent://SD_ILS/0/SD_ILS:8079062024-04-23T13:44:54Z2024-04-23T13:44:54Zby Juliza Auzir<br/>Author Juliza Auzir, Hazinah Kutty Mammi, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 J85 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Authentication using gameent://SD_ILS/0/SD_ILS:8079112024-04-23T13:44:54Z2024-04-23T13:44:54Zby Juliza Auzir<br/>Author Juliza Auzir<br/>Format: Books<br/>Call Number CP 030860 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112622024-04-23T13:44:54Z2024-04-23T13:44:54Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A844 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Efficiency key generation management in a big organization for symmetric cryptography systement://SD_ILS/0/SD_ILS:8112642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Atefeh Mirzaee, 1986-<br/>Author Atefeh Mirzaee, 1986-<br/>Format: Books<br/>Call Number CP 030847 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Physical security measures framework for Marib power plant (Yemen)ent://SD_ILS/0/SD_ILS:8114612024-04-23T13:44:54Z2024-04-23T13:44:54Zby Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Author Anas Mustafa Mohammed Al-Aghbari, 1981-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A534 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Physical security measures framework for Marib power plant (Yemen)ent://SD_ILS/0/SD_ILS:8114642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Author Anas Mustafa Mohammed Al-Aghbari, 1981-<br/>Format: Books<br/>Call Number CP 031197 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Covre optimization for image steganography by using image peaturesent://SD_ILS/0/SD_ILS:8115482024-04-23T13:44:54Z2024-04-23T13:44:54Zby Zaid Nidhal Khudhair, 1988-<br/>Author Zaid Nidhal Khudhair, 1988-, Dzulkifli Mohamad, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.15 Z35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Covre optimization for image steganography by using image peaturesent://SD_ILS/0/SD_ILS:8115522024-04-23T13:44:54Z2024-04-23T13:44:54Zby Zaid Nidhal Khudhair, 1988-<br/>Author Zaid Nidhal Khudhair, 1988-<br/>Format: Books<br/>Call Number CP 031142 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Improving information system security by evaluating human factordent://SD_ILS/0/SD_ILS:8115532024-04-23T13:44:54Z2024-04-23T13:44:54Zby Saeed Soltanmohammadi, 1987-<br/>Author Saeed Soltanmohammadi, 1987-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S244 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Improving information system security by evaluating human factordent://SD_ILS/0/SD_ILS:8115552024-04-23T13:44:54Z2024-04-23T13:44:54Zby Saeed Soltanmohammadi, 1987-<br/>Author Saeed Soltanmohammadi, 1987-<br/>Format: Books<br/>Call Number CP 031187 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>USB storage authentication, delegation and revocation mechanisms based on multilevel trust modelent://SD_ILS/0/SD_ILS:8115682024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mahboubi, Arash, 1981-<br/>Author Mahboubi, Arash, 1981-, Shukor Abd. Razak, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK7895.B87 M34 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Hybrid artificial neural network and gravitational search algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8117212024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rahati, Shahdokht, 1982-<br/>Author Rahati, Shahdokht, 1982-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 R347 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Hybrid artificial neural network and gravitational search algorithm in intrusion detection systement://SD_ILS/0/SD_ILS:8117222024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rahati, Shahdokht, 1982-<br/>Author Rahati, Shahdokht, 1982-<br/>Format: Books<br/>Call Number CP 031733 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A453 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-<br/>Format: Books<br/>Call Number CP 031153 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Multi level authentication mechanism for grid application using one-time passwordent://SD_ILS/0/SD_ILS:8117502024-04-23T13:44:54Z2024-04-23T13:44:54Zby Armaghan Behnia, 1986-<br/>Author Armaghan Behnia, 1986-, Imran Ghani, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A76 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Multi level authentication mechanism for grid application using one-time passwordent://SD_ILS/0/SD_ILS:8117512024-04-23T13:44:54Z2024-04-23T13:44:54Zby Armaghan Behnia, 1986-<br/>Author Armaghan Behnia, 1986-<br/>Format: Books<br/>Call Number CP 031744 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:8184482024-04-23T13:44:54Z2024-04-23T13:44:54Zby Raggo, Michael T., author<br/>Author Raggo, Michael T., author, Hosmer, Chet, author, McGrew, Wesley, editor<br/>Format: Books<br/>Call Number QA76.9.A25 R346 2013<br/>Edition 1st ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497435<br/>An enhanced performance model for metamorphic computer virus classification and detectionent://SD_ILS/0/SD_ILS:8194052024-04-23T13:44:54Z2024-04-23T13:44:54Zby Basharirad, Babak, 1979-<br/>Author Basharirad, Babak, 1979-<br/>Format: Books<br/>Call Number CP 032010 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:8211582024-04-23T13:44:54Z2024-04-23T13:44:54Zby Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>Management of information securityent://SD_ILS/0/SD_ILS:8226902024-04-23T13:44:54Z2024-04-23T13:44:54Zby Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number T58.6 W45 2013<br/>Edition 4th ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2013<br/>ISBN 9781285062297<br/>Information security risk assessment toolkit : practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:7979732024-04-23T13:44:54Z2024-04-23T13:44:54Zby Talabis, Mark<br/>Author Talabis, Mark, Martin, Jason<br/>Format: Books<br/>Call Number QA76.9.A25 T354 2013<br/>Publisher Elsevier,<br/>Publication Date 2013<br/>ISBN 9781597497350<br/>The hacker's guide to OS X : exploiting OS X from the root-upent://SD_ILS/0/SD_ILS:7979872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bathurst, Robert<br/>Author Bathurst, Robert, Rogers, Russ, Ghassemlouei, Alijohn<br/>Format: Books<br/>Call Number QA76.774.M33 B38 2013<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597499507<br/>Discrete dynamical systems and chaotic machines : theory and applicationsent://SD_ILS/0/SD_ILS:8288232024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bahi, Jacques Mohcine, author<br/>Author Bahi, Jacques Mohcine, author, Guyeux, Christophe, author<br/>Format: Books<br/>Call Number QA76.9.A25 B344 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781466554504<br/>Elementary information securityent://SD_ILS/0/SD_ILS:8291212024-04-23T13:44:54Z2024-04-23T13:44:54Zby Smith, Richard E.<br/>Author Smith, Richard E.<br/>Format: Books<br/>Call Number QA76.9.A25 S658 2013<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2013<br/>ISBN 9781449648206<br/>Cyber security for educational leaders : a guide to understanding and implementing technology policiesent://SD_ILS/0/SD_ILS:8300492024-04-23T13:44:54Z2024-04-23T13:44:54Zby Phillips, Richard A.<br/>Author Phillips, Richard A., Sianjina, Rayton R.<br/>Format: Books<br/>Call Number LB1028.3 P454 2013<br/>Publisher Routledge,<br/>Publication Date 2013<br/>ISBN 9780415631969 9780415631976<br/>Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environmentent://SD_ILS/0/SD_ILS:8350432024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hau, Lian Hong<br/>Author Hau, Lian Hong, Bharanidharan Shanmugam, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 H384 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains ( Information security)) - Universiti Teknologi Malaysia, 2013<br/>Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environmentent://SD_ILS/0/SD_ILS:8350442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hau, Lian Hong<br/>Author Hau, Lian Hong<br/>Format: Books<br/>Call Number CP 033582 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Information security)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing cybersecurity awareness through role and performance based training modelent://SD_ILS/0/SD_ILS:8355372024-04-23T13:44:54Z2024-04-23T13:44:54Zby Khan, Nouman Qadeer<br/>Author Khan, Nouman Qadeer, Samy, Ganthan Narayana, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 K43 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2013<br/>Enhancing cybersecurity awareness through role and performance based training modelent://SD_ILS/0/SD_ILS:8355382024-04-23T13:44:54Z2024-04-23T13:44:54Zby Khan, Nouman Qadeer<br/>Author Khan, Nouman Qadeer<br/>Format: Books<br/>Call Number CP 033549 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2013<br/>Information security vulnerability in an Iranian context from human perspective(electrical industry)ent://SD_ILS/0/SD_ILS:8355512024-04-23T13:44:54Z2024-04-23T13:44:54Zby Pouransafar, Malahat<br/>Author Pouransafar, Malahat<br/>Format: Books<br/>Call Number CP 033585 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>An efficient recognition-based graphical password scheme improving security and usabilityent://SD_ILS/0/SD_ILS:8356462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Khodadadi, Touraj<br/>Author Khodadadi, Touraj, Azizah Abdul Manaf, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 K46 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:8372152024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jacobson, Douglas, author<br/>Author Jacobson, Douglas, author, Idziorek, Joseph, author<br/>Format: Books<br/>Call Number QA76.9.A25 J334 2013<br/>Publisher CRC Press / Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781439856185<br/>Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniquesent://SD_ILS/0/SD_ILS:8408602024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bakhdlaghi, Yousef<br/>Author Bakhdlaghi, Yousef, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B352 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing the effectiveness of snort network intrusion detection system (NIDS) against evasion techniquesent://SD_ILS/0/SD_ILS:8408612024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bakhdlaghi, Yousef<br/>Author Bakhdlaghi, Yousef<br/>Format: Books<br/>Call Number CP 033967 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Preparedness in encountering cyberwarfare in Malaysiaent://SD_ILS/0/SD_ILS:8418192024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norma Liyana Omar<br/>Author Norma Liyana Omar, Zuraini Ismail, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number HV6773 N67 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Preparedness in encountering cyberwarfare in Malaysiaent://SD_ILS/0/SD_ILS:8418212024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norma Liyana Omar<br/>Author Norma Liyana Omar<br/>Format: Books<br/>Call Number CP 034029 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security vulnerability in an Iranian context from human perspective(electrical industry)ent://SD_ILS/0/SD_ILS:8355492024-04-23T13:44:54Z2024-04-23T13:44:54Zby Pouransafar, Malahat<br/>Author Pouransafar, Malahat, Nurazean Maarop, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 P68 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A secure method against frequency attack for pattern query on encrypted string dataent://SD_ILS/0/SD_ILS:8356552024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ravan, Rama Roshan<br/>Author Ravan, Rama Roshan, Norbik Bashah Idris, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 R384 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A secure method against frequency attack for pattern query on encrypted string dataent://SD_ILS/0/SD_ILS:8356572024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ravan, Rama Roshan<br/>Author Ravan, Rama Roshan<br/>Format: Books<br/>Call Number CP 033553 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Security basics for computer architectsent://SD_ILS/0/SD_ILS:8359122024-04-23T13:44:54Z2024-04-23T13:44:54Zby Lee, Ruby B., author<br/>Author Lee, Ruby B., author<br/>Format: Books<br/>Call Number QA76.9.A73 L444 2013<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2013<br/>ISBN 9781627051552<br/>Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data : an excerpt from Malware Forensic Field Guide for Linux Systemsent://SD_ILS/0/SD_ILS:8379862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Malin, Cameron H., author<br/>Author Malin, Cameron H., author, Aquilina, James M., Casey, Eoghan<br/>Format: Books<br/>Call Number QA76.3 M353 2013<br/>Publisher Elsevier Science,<br/>Publication Date 2013<br/>ISBN 9780124095076<br/>Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8408422024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bojnord, Hoda Soltanian<br/>Author Bojnord, Hoda Soltanian, Teddy Mantoro, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B664 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Improving neighboring vehicle method to detect sybile attack in vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8408442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bojnord, Hoda Soltanian<br/>Author Bojnord, Hoda Soltanian<br/>Format: Books<br/>Call Number CP 033625 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931432024-04-23T13:44:54Z2024-04-23T13:44:54Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A457 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Elements for privacy policy in E-Commerce based on higher education perspective[electronic resource]ent://SD_ILS/0/SD_ILS:7931862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Afiqah Ahmad Said, 1986-<br/>Author Afiqah Ahmad Said, 1986-<br/>Format: Books<br/>Call Number CP 028741 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/>A study on hazard risk governance framework in FSKSM UTM Skudaient://SD_ILS/0/SD_ILS:7931872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Amalina Farhan Kamaruddin, 1985-<br/>Author Amalina Farhan Kamaruddin, 1985-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A435 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Measuring information security awareness level in public organizationent://SD_ILS/0/SD_ILS:7931912024-04-23T13:44:54Z2024-04-23T13:44:54Zby Doaa Saleh Abobakar Baras, 1987-<br/>Author Doaa Saleh Abobakar Baras, 1987-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 D63 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanisment://SD_ILS/0/SD_ILS:7933342024-04-23T13:44:54Z2024-04-23T13:44:54Zby Lim, Kah Seng, 1986-<br/>Author Lim, Kah Seng, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 L565 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanisment://SD_ILS/0/SD_ILS:7933362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Lim, Kah Seng, 1986-<br/>Author Lim, Kah Seng, 1986-<br/>Format: Books<br/>Call Number CP 028068 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Hacking web apps : detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:7979622024-04-23T13:44:54Z2024-04-23T13:44:54Zby Shema, Mike<br/>Author Shema, Mike<br/>Format: Books<br/>Call Number TK5105.59 S545 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597499514<br/>Advances in intelligence and security informaticsent://SD_ILS/0/SD_ILS:7989232024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mao, Wenji<br/>Author Mao, Wenji, Wang, Fei-Yue<br/>Format: Books<br/>Call Number QA76.9.A25 M335 2012<br/>Edition 1st ed.<br/>Publisher Academic Press ; Zhejiang University Press,<br/>Publication Date 2012<br/>ISBN 9780123972002<br/>Hacking exposed 7 : network security secrets & solutionsent://SD_ILS/0/SD_ILS:8013632024-04-23T13:44:54Z2024-04-23T13:44:54Zby McClure, Stuart<br/>Author McClure, Stuart, McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M483 2012<br/>Edition 7th ed.<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2012<br/>ISBN 9780071780285<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:8041492024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stallings, William<br/>Author Stallings, William, Brown, Lawrie<br/>Format: Books<br/>Call Number QA76.9.A25 S73 2012<br/>Edition 2nd ed. International ed.<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273764496<br/>Network and application security fundamentals and practicesent://SD_ILS/0/SD_ILS:8053012024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ganguly, Debashis<br/>Author Ganguly, Debashis, Lahiri, Shibamouli<br/>Format: Books<br/>Call Number TK5105.59 G365 2012<br/>Publisher Science Publishers ; Distributed by CRC Press,<br/>Publication Date 2012<br/>ISBN 9781578087556<br/>Embedded systems security : practical methods for safe and secure software and systems developmentent://SD_ILS/0/SD_ILS:8055962024-04-23T13:44:54Z2024-04-23T13:44:54Zby Kleidermacher, David<br/>Author Kleidermacher, David, Kleidermacher, Mike<br/>Format: Books<br/>Call Number QA76.76.D47 K564 2012<br/>Edition 1st ed.<br/>Publisher Elsevier,<br/>Publication Date 2012<br/>ISBN 9780123868862<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:8083182024-04-23T13:44:54Z2024-04-23T13:44:54Zby Colantonio, Alessandro<br/>Author Colantonio, Alessandro, Di Pietro, Roberto, Ocello, Alberto<br/>Format: Books<br/>Call Number QA76.9.A25 C657 2012<br/>Publisher World Scientific,<br/>Publication Date 2012<br/>ISBN 9789814374002<br/>Reliability and availability of cloud computingent://SD_ILS/0/SD_ILS:8211452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bauer, Eric<br/>Author Bauer, Eric, Adams, Randee<br/>Format: Books<br/>Call Number QA76.585 B394 2012<br/>Publisher Wiley-IEEE Press,<br/>Publication Date 2012<br/>ISBN 9781118177013<br/>ARP poisoning detection and protection using client's ARP table monitoringent://SD_ILS/0/SD_ILS:7782332024-04-23T13:44:54Z2024-04-23T13:44:54Zby Navid Behboodian, 1986-<br/>Author Navid Behboodian, 1986-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N38 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>ARP poisoning detection and protection using client's ARP table monitoringent://SD_ILS/0/SD_ILS:7782342024-04-23T13:44:54Z2024-04-23T13:44:54Zby Navid Behboodian, 1986-<br/>Author Navid Behboodian, 1986-<br/>Format: Books<br/>Call Number CP 027522 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782652024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-<br/>Format: Books<br/>Call Number CP 027518 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Inference binary search algorithm for blind timing-based attack in MYSQL injector vulnerability checker toolent://SD_ILS/0/SD_ILS:7785482024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdilahi Deria Liban, 1982-<br/>Author Abdilahi Deria Liban, 1982-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.73.S67 A23 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Inference binary search algorithm for blind timing-based attack in MYSQL injector vulnerability checker toolent://SD_ILS/0/SD_ILS:7785492024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdilahi Deria Liban, 1982-<br/>Author Abdilahi Deria Liban, 1982-<br/>Format: Books<br/>Call Number CP 027551 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:7800022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>Secure and resilient software : requirements, test cases, and testing methodsent://SD_ILS/0/SD_ILS:7853872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Raghavan, Lakshmikanth<br/>Format: Books<br/>Call Number QA76.76.T48 M47 2012<br/>Publisher CRC Press,<br/>Publication Date 2012<br/>ISBN 9781439866214<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864962024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M644 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864982024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-<br/>Format: Books<br/>Call Number CP 027919 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Secure blood bag labeling via 2d barcode authenticationent://SD_ILS/0/SD_ILS:7865312024-04-23T13:44:54Z2024-04-23T13:44:54Zby Asvhini Subramaniam, 1985-<br/>Author Asvhini Subramaniam, 1985-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A885 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Threat profiling based on vulnerability assessment and penetration testing: iphone case studyent://SD_ILS/0/SD_ILS:7869232024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rafhana Abd Rashid, 1987-<br/>Author Rafhana Abd Rashid, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.8.I64 R34 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Threat profiling based on vulnerability assessment and penetration testing: iphone case studyent://SD_ILS/0/SD_ILS:7869362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Rafhana Abd Rashid, 1987-<br/>Author Rafhana Abd Rashid, 1987-<br/>Format: Books<br/>Call Number CP 027694 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Teknik penyembunyian fingerprint honeypot maya(honeyd) dari penggodament://SD_ILS/0/SD_ILS:7875652024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yanti Munirah Jusoh , author<br/>Author Yanti Munirah Jusoh , author, Md. Asri Ngadi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 Y363 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Pemantauan aktiviti penggodam dalam honeypotent://SD_ILS/0/SD_ILS:7876862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nurul Hafizah Sebaweh, author<br/>Author Nurul Hafizah Sebaweh, author, Md. Asri Ngadi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N879 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Pemantauan aktiviti penggodam dalam honeypotent://SD_ILS/0/SD_ILS:7876872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nurul Hafizah Sebaweh, author<br/>Author Nurul Hafizah Sebaweh, author, Md. Asri Ngadi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Electronic Resources<br/>Call Number CP 058429 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Video steganografi menggunakan fail video flash(FLV)ent://SD_ILS/0/SD_ILS:7878862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Farid Ahmad Nasir<br/>Author Mohd. Farid Ahmad Nasir, Md. Asri Ngadi, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.76.D47 M43 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Video steganografi menggunakan fail video flash(FLV)ent://SD_ILS/0/SD_ILS:7878872024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd. Farid Ahmad Nasir<br/>Author Mohd. Farid Ahmad Nasir<br/>Format: Books<br/>Call Number CP 027702 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902772024-04-23T13:44:54Z2024-04-23T13:44:54Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>SQL injection attacks and defenseent://SD_ILS/0/SD_ILS:7979842024-04-23T13:44:54Z2024-04-23T13:44:54Zby Clarke, Justin<br/>Author Clarke, Justin<br/>Format: Books<br/>Call Number QA76.9.A25 C542 2012<br/>Publisher Elsevier,<br/>Publication Date 2012<br/>ISBN 9781597499637<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-04-23T13:44:54Z2024-04-23T13:44:54Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A28 N37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness level framework to assess bank employees : Maybank Taman Universiti case studyent://SD_ILS/0/SD_ILS:7863412024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bassem Gamal Hanash Qasem, 1984-<br/>Author Bassem Gamal Hanash Qasem, 1984-, Imran Ghani, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 B375 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness level framework to assess bank employees Maybank Taman Universiti case studyent://SD_ILS/0/SD_ILS:7863442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bassem Gamal Hanash Qasem, 1984-<br/>Author Bassem Gamal Hanash Qasem, 1984-<br/>Format: Books<br/>Call Number CP 028279 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Teknik penyembunyian fingerprint honeypot maya(honeyd) dari penggodament://SD_ILS/0/SD_ILS:7875672024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yanti Munirah Jusoh , author<br/>Author Yanti Munirah Jusoh , author<br/>Format: Books<br/>Call Number CP 082471 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Penyembunyian maklumat rahsia menggunakan teknik kod ruang istimewa dalam aplikasi mel elektronikent://SD_ILS/0/SD_ILS:7881132024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nor Amira Nor Azhan, author<br/>Author Nor Amira Nor Azhan, author, Md. Asri Ngadi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.73 N673 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Penyembunyian maklumat rahsia menggunakan teknik kod ruang istimewa dalam aplikasi mel elektronikent://SD_ILS/0/SD_ILS:7881192024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nor Amira Nor Azhan, author<br/>Author Nor Amira Nor Azhan, author, Md. Asri Ngadi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Electronic Resources<br/>Call Number CP 058363 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Least significant bit image steganography using particle swarm optimization and optical pixel adjustmentent://SD_ILS/0/SD_ILS:7902802024-04-23T13:44:54Z2024-04-23T13:44:54Zby Parisa Gerami, 1994-<br/>Author Parisa Gerami, 1994-<br/>Format: Books<br/>Call Number CP 027550 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Elements for privacy policy in E-Commerce based on higher education perspectiveent://SD_ILS/0/SD_ILS:7931752024-04-23T13:44:54Z2024-04-23T13:44:54Zby Afiqah Ahmad Said, 1986-<br/>Author Afiqah Ahmad Said, 1986-, Ab. Razak Che Hussin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A354 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Teknologi Maklumat - Pengurusan)) - Universiti Teknologi Malaysia, 2012<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931442024-04-23T13:44:54Z2024-04-23T13:44:54Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-<br/>Format: Books<br/>Call Number CP 028362 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Email header forgery detection mechanisment://SD_ILS/0/SD_ILS:7931462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Adnan Abdirahman Adami, 1984-<br/>Author Adnan Abdirahman Adami, 1984-, Shukur Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A36 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study on hazard risk governance framework in FSKSM UTM Skudaient://SD_ILS/0/SD_ILS:7931882024-04-23T13:44:54Z2024-04-23T13:44:54Zby Amalina Farhan Kamaruddin, 1985-<br/>Author Amalina Farhan Kamaruddin, 1985-<br/>Format: Books<br/>Call Number CP 028119 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Measuring information security awareness level in public organizationent://SD_ILS/0/SD_ILS:7931922024-04-23T13:44:54Z2024-04-23T13:44:54Zby Doaa Saleh Abobakar Baras, 1987-<br/>Author Doaa Saleh Abobakar Baras, 1987-, Mohd. Aizaini Maarof, supervisor<br/>Format: Books<br/>Call Number CP 028361 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Email header forgery detection mechanisment://SD_ILS/0/SD_ILS:7931632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Adnan Abdirahman Adami, 1984-<br/>Author Adnan Abdirahman Adami, 1984-<br/>Format: Books<br/>Call Number CP 028360 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security and awareness metrics measurementent://SD_ILS/0/SD_ILS:7932622024-04-23T13:44:54Z2024-04-23T13:44:54Zby Suzlily Abd. Hakim, 1986-<br/>Author Suzlily Abd. Hakim, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S895 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security and awareness metrics measurementent://SD_ILS/0/SD_ILS:7932632024-04-23T13:44:54Z2024-04-23T13:44:54Zby Suzlily Abd. Hakim, 1986-<br/>Author Suzlily Abd. Hakim, 1986-<br/>Format: Books<br/>Call Number CP 028847 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932642024-04-23T13:44:54Z2024-04-23T13:44:54Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M67 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Image steganography using least significant bit approach enhanced with compression and encryptionent://SD_ILS/0/SD_ILS:7932652024-04-23T13:44:54Z2024-04-23T13:44:54Zby Morteza Bashardoost, 1983-<br/>Author Morteza Bashardoost, 1983-<br/>Format: Books<br/>Call Number CP 028728 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud computingent://SD_ILS/0/SD_ILS:8350272024-04-23T13:44:54Z2024-04-23T13:44:54Zby Muhammad Fisal Zakaria<br/>Author Muhammad Fisal Zakaria, Shanmugam, Bharani, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.585 M84 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Analysys on security issue of service dilevery model software as a service (SAAS) in public cloud comptuingent://SD_ILS/0/SD_ILS:8350282024-04-23T13:44:54Z2024-04-23T13:44:54Zby Muhammad Fisal Zakaria<br/>Author Muhammad Fisal Zakaria, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033572 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375902024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh, Zuraini Ismail, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 S273 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376852024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6438 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376862024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar<br/>Format: Books<br/>Call Number CP 034141 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Standard operating procedure for tape recording and handling taped evidence in Malaysian anti corruption commision investigationent://SD_ILS/0/SD_ILS:8378402024-04-23T13:44:54Z2024-04-23T13:44:54Zby Raub Ghani<br/>Author Raub Ghani, Azizah Abdul Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 R383 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Standard operating procedure for tape recording and handling taped evidence in Malaysian anti corruption commision investigationent://SD_ILS/0/SD_ILS:8378412024-04-23T13:44:54Z2024-04-23T13:44:54Zby Raub Ghani<br/>Author Raub Ghani<br/>Format: Books<br/>Call Number CP 034146 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:8380042024-04-23T13:44:54Z2024-04-23T13:44:54Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author<br/>Format: Books<br/>Call Number QA76.9.A25 W34 2012<br/>Edition Fourth edition<br/>Publisher Course Technology,<br/>Publication Date 2012<br/>ISBN 9781111138219<br/>An anti-malvertising model for university students to increase security awarenessent://SD_ILS/0/SD_ILS:8402952024-04-23T13:44:54Z2024-04-23T13:44:54Zby Noorlaily Izwana Ibrahim<br/>Author Noorlaily Izwana Ibrahim, Mazdak Zamani, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.76.C68 N66 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375922024-04-23T13:44:54Z2024-04-23T13:44:54Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh<br/>Format: Books<br/>Call Number CP 034152 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>An anti-malvertising model for university students to increase security awarenessent://SD_ILS/0/SD_ILS:8402962024-04-23T13:44:54Z2024-04-23T13:44:54Zby Noorlaily Izwana Ibrahim<br/>Author Noorlaily Izwana Ibrahim<br/>Format: Books<br/>Call Number CP 033979 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Analyzing security behaviour in managing passwords among staffs of community collegesent://SD_ILS/0/SD_ILS:8405052024-04-23T13:44:54Z2024-04-23T13:44:54Zby Hazila Hasan, 1981-<br/>Author Hazila Hasan, 1981-, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 H396 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:7488172024-04-23T13:44:54Z2024-04-23T13:44:54Zby Winkler, J. R. (Joachim R.)<br/>Author Winkler, J. R. (Joachim R.)<br/>Format: Books<br/>Call Number QA76.585 W56 2011<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495929<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:7502202024-04-23T13:44:54Z2024-04-23T13:44:54Zby Dua, Sumeet<br/>Author Dua, Sumeet, Du, Xian<br/>Format: Books<br/>Call Number QA76.9.D343 D83 2011<br/>Publisher Taylor & Francis,<br/>Publication Date 2011<br/>ISBN 9781439839423<br/>Security strategies in Linux platforms and applicationsent://SD_ILS/0/SD_ILS:7641542024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jang, Michael H.<br/>Author Jang, Michael H.<br/>Format: Books<br/>Call Number QA76.76.O63 J366 2011<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2011<br/>ISBN 9780763791896<br/>The basics of hacking and penetration testing : ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:7991102024-04-23T13:44:54Z2024-04-23T13:44:54Zby Engebretson, Pat (Patrick Henry), 1974-<br/>Author Engebretson, Pat (Patrick Henry), 1974-, Broad, James<br/>Format: Books<br/>Call Number QA76.9.A25 E54 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496551<br/>Software engineering for secure systems : industrial and research perspectivesent://SD_ILS/0/SD_ILS:8019072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mouratidis, Haralambos, 1977-<br/>Author Mouratidis, Haralambos, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 S6537 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781615208371 9781615208388<br/>Windows registry forensics advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:8133672024-04-23T13:44:54Z2024-04-23T13:44:54Zby Carvey, Harlan<br/>Author Carvey, Harlan<br/>Format: Books<br/>Call Number CP 030880<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>Information assurance and security ethics in complex systems : interdisciplinary perspectivesent://SD_ILS/0/SD_ILS:6304272024-04-23T13:44:54Z2024-04-23T13:44:54Zby Dark, Melissa Jane, 1961-<br/>Author Dark, Melissa Jane, 1961-<br/>Format: Books<br/>Call Number QA76.9.A25 I545 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781616922450 9781616922467<br/>Hacking exposed : web applications : web application security secrets and solutionsent://SD_ILS/0/SD_ILS:6431912024-04-23T13:44:54Z2024-04-23T13:44:54Zby Scambray, Joel<br/>Author Scambray, Joel, Liu, Vincent, Sima, Caleb<br/>Format: Books<br/>Call Number TK5105.59 S324 2011<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill Companies,<br/>Publication Date 2011<br/>ISBN 9780071740647<br/>Gray hat hacking : the ethical hacker's handbookent://SD_ILS/0/SD_ILS:6439472024-04-23T13:44:54Z2024-04-23T13:44:54Zby Harris, Shon<br/>Author Harris, Shon<br/>Format: Books<br/>Call Number QA76.9.A25 G724 2011<br/>Edition 3rd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742559<br/>Physical-layer security : from information theory to security engineeringent://SD_ILS/0/SD_ILS:8023302024-04-23T13:44:54Z2024-04-23T13:44:54Zby Bloch, Matthieu, 1981-<br/>Author Bloch, Matthieu, 1981-, Barros, Joao<br/>Format: Books<br/>Call Number TK5105.59 B574 2011<br/>Publisher Cambridge University Press,<br/>Publication Date 2011<br/>ISBN 9780521516501<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:8073562024-04-23T13:44:54Z2024-04-23T13:44:54Zby Goodrich, Michael T.<br/>Author Goodrich, Michael T., Tamassia, Roberto, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 G66 2011<br/>Publisher Addison-Wesley,<br/>Publication Date 2011<br/>ISBN 9780321512949<br/>Malware forensic field guide for windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:7488072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Malin, Cameron H.<br/>Author Malin, Cameron H., Casey, Eoghan, Aquilina, James M<br/>Format: Books<br/>Call Number QA76.76.C68 M322 2012<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597494724<br/>Enhanced SVD watermarking algorithmsent://SD_ILS/0/SD_ILS:7566072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Iman Omidvar Tehrani<br/>Author Iman Omidvar Tehrani, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I43 2011 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Enhanced SVD watermarking algorithmsent://SD_ILS/0/SD_ILS:7566082024-04-23T13:44:54Z2024-04-23T13:44:54Zby Iman Omidvar Tehrani<br/>Author Iman Omidvar Tehrani, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 025519 ra<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Adaptive color image watermarking wavelet transforment://SD_ILS/0/SD_ILS:7567142024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohammed Ibrahim Said<br/>Author Mohammed Ibrahim Said, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M643 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2011<br/>Adaptive color image watermarking wavelet transforment://SD_ILS/0/SD_ILS:7567222024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohammed Ibrahim Said<br/>Author Mohammed Ibrahim Said, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 025215 ra<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Sains Komputer)) – Universiti Teknologi Malaysia, 2011<br/>Computer securityent://SD_ILS/0/SD_ILS:7567302024-04-23T13:44:54Z2024-04-23T13:44:54Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2011<br/>Edition 3rd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470741153<br/>Malware analyst's cookbook and DVD : tools and techniques for fighting malicious codeent://SD_ILS/0/SD_ILS:7585062024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ligh, Michael Hale<br/>Author Ligh, Michael Hale<br/>Format: Books<br/>Call Number QA76.9.A25 M353 2011<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470613030<br/>A guide to kernel exploitation : attacking the coreent://SD_ILS/0/SD_ILS:7587452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Perla, Enrico<br/>Author Perla, Enrico, Massimiliano, Oldani<br/>Format: Books<br/>Call Number QA76.76.O63 P568 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597494861<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:7587782024-04-23T13:44:54Z2024-04-23T13:44:54Zby Metula, Erez<br/>Author Metula, Erez<br/>Format: Books<br/>Call Number QA76.9.A25 M487 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495745<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:7612902024-04-23T13:44:54Z2024-04-23T13:44:54Zby Davis, Chris (Christopher Michael)<br/>Author Davis, Chris (Christopher Michael), Schiller, Mike, Wheeler, Kevin<br/>Format: Books<br/>Call Number QA76.9.A93 D38 2011<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742382<br/>Mobile device security for dummiesent://SD_ILS/0/SD_ILS:7783002024-04-23T13:44:54Z2024-04-23T13:44:54Zby Campagna, Rich R.<br/>Author Campagna, Rich R., Iyer, Sibbu, Krishnan, Ashwin<br/>Format: Books<br/>Call Number QA76.9.A25 C364 2011<br/>Publisher Wiley Pubishing, Inc.,<br/>Publication Date 2011<br/>ISBN 9780470927533<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:7582562024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S713 2011<br/>Edition 5th ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136097044<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:7586052024-04-23T13:44:54Z2024-04-23T13:44:54Zby Solomon, Michael, (Michael G.), 1963-<br/>Author Solomon, Michael, (Michael G.), 1963-, Rudolph, K., Tittel, Ed., Broom, Neil, Barrett, Diane<br/>Format: Books<br/>Call Number QA76.9.A25 S656 2011<br/>Edition Second edition.<br/>Publisher Wiley Publishing, Inc.<br/>Publication Date 2011<br/>ISBN 9780470931660<br/>Security 2020 : reduce security risks this decadeent://SD_ILS/0/SD_ILS:7586082024-04-23T13:44:54Z2024-04-23T13:44:54Zby Howard, Doug<br/>Author Howard, Doug, Prince, Kevin<br/>Format: Books<br/>Call Number QA76.9.A25 H6976 2011<br/>Edition 1st ed.<br/>Publisher Wiley Pub.,<br/>Publication Date 2011<br/>ISBN 9780470639559<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:7587262024-04-23T13:44:54Z2024-04-23T13:44:54Zby Carvey, Harlan A.<br/>Author Carvey, Harlan A.<br/>Format: Books<br/>Call Number HV8079.C65 C373 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495806<br/>Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-ent://SD_ILS/0/SD_ILS:7587942024-04-23T13:44:54Z2024-04-23T13:44:54Zby Heiderich, Mario<br/>Author Heiderich, Mario<br/>Format: Books<br/>Call Number QA76.625 H46 2011<br/>Publisher Elsevier/Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496049<br/>Securing SQL server : protecting your database from attackersent://SD_ILS/0/SD_ILS:7588112024-04-23T13:44:54Z2024-04-23T13:44:54Zby Cherry, Denny<br/>Author Cherry, Denny, Larock, Thomas<br/>Format: Books<br/>Call Number QA76.73.S67 C478 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496254<br/>Information security : principles and practiceent://SD_ILS/0/SD_ILS:7792502024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stamp, Mark<br/>Author Stamp, Mark<br/>Format: Books<br/>Call Number QA76.9.A25 S75 2011<br/>Edition 2nd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470626399<br/>Roadmap to information security : for IT and InfoSec managersent://SD_ILS/0/SD_ILS:7811022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Whitman, Michael E.<br/>Author Whitman, Michael E., Mattord, Herbert J.<br/>Format: Books<br/>Call Number QA76.9.A25 W45 2011<br/>Publisher Cengage Learning,<br/>Publication Date 2011<br/>ISBN 9781435480308<br/>Introduction to security and network forensicsent://SD_ILS/0/SD_ILS:7850732024-04-23T13:44:54Z2024-04-23T13:44:54Zby Buchanan, William J.<br/>Author Buchanan, William J.<br/>Format: Books<br/>Call Number QA76.9.A25 B824 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9780849335686<br/>Cyber security, cyber crime and cyber forensics : applications and perspectivesent://SD_ILS/0/SD_ILS:7729772024-04-23T13:44:54Z2024-04-23T13:44:54Zby Santanam, Raghu, 1969-<br/>Author Santanam, Raghu, 1969-, Sethumadhavan, M., 1966-, Virendra, Mohit<br/>Format: Books<br/>Call Number QA76.9.A25 C93 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781609601232 9781609601256<br/>Malware analyst's cookbook and DVD tools and techniques for fighting malicious codeent://SD_ILS/0/SD_ILS:7743052024-04-23T13:44:54Z2024-04-23T13:44:54Zby Ligh, Michael Hale<br/>Author Ligh, Michael Hale<br/>Format: Books<br/>Call Number CP 025051<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 978KPART19400 (dvd.)<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7762672024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdolreza Rasouli Kenari, 1979-<br/>Author Abdolreza Rasouli Kenari, 1979-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2011 raf<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7778612024-04-23T13:44:54Z2024-04-23T13:44:54Zby Abdolreza Rasouli Kenari<br/>Author Abdolreza Rasouli Kenari<br/>Format: Books<br/>Call Number CP 028869 ra<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Intrusion detection : a machine learning approachent://SD_ILS/0/SD_ILS:7807362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Yu, Zhenwei<br/>Author Yu, Zhenwei, Tsai, Jeffrey J. P.<br/>Format: Books<br/>Call Number TK5105.59 Y89 2011<br/>Publisher Imperial College Press,<br/>Publication Date 2011<br/>ISBN 9781848164475<br/>Information security evaluation : a holistic approachent://SD_ILS/0/SD_ILS:7811512024-04-23T13:44:54Z2024-04-23T13:44:54Zby Tashi, Igli<br/>Author Tashi, Igli, Ghernaouti-Helie, Solange<br/>Format: Books<br/>Call Number TK5105.59 T374 2011<br/>Publisher EFPL Pr.,<br/>Publication Date 2011<br/>ISBN 9781439879153<br/>Mycrypttools cryptographic algorithm learning aident://SD_ILS/0/SD_ILS:7876752024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nelmiawati, author<br/>Author Nelmiawati, author, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number Z103 N45 2011 raf<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Mycrypttools cryptographic algorithm learning aident://SD_ILS/0/SD_ILS:7876762024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nelmiawati, author,<br/>Author Nelmiawati, author,<br/>Format: Electronic Resources<br/>Call Number CP 058333 ra<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Introduction to cryptography with open-source softwareent://SD_ILS/0/SD_ILS:7891252024-04-23T13:44:54Z2024-04-23T13:44:54Zby McAndrew, Alasdair<br/>Author McAndrew, Alasdair<br/>Format: Books<br/>Call Number QA76.9 .A25 M398 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9781439825709<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:7891342024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mena, Jesus.<br/>Author Mena, Jesus.<br/>Format: Books<br/>Call Number HV8073 M395 2011<br/>Publisher Taylor & Francis,<br/>Publication Date 2011<br/>ISBN 9781439860694<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:3777612024-04-23T13:44:54Z2024-04-23T13:44:54Zby Stallings, William<br/>Author Stallings, William<br/>Format: Books<br/>Call Number TK5105.59 S72 2011<br/>Edition 4th ed.<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2011<br/>ISBN 9780136108054<br/>Information security risk management awareness in e-government outsourced projectsent://SD_ILS/0/SD_ILS:8360202024-04-23T13:44:54Z2024-04-23T13:44:54Zby Zalehah Muyet<br/>Author Zalehah Muyet, Zuraini Ismail, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 Z354 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Keselamatan Maklumat) - Universiti Teknologi Malaysia, 2011<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:8384012024-04-23T13:44:54Z2024-04-23T13:44:54Zby Andress, Jason<br/>Author Andress, Jason, Rogers, Russ, editor<br/>Format: Computer file<br/>Call Number QA76.9.A25 A535 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597496537<br/>Computer security : protecting digital resourcesent://SD_ILS/0/SD_ILS:3746692024-04-23T13:44:54Z2024-04-23T13:44:54Zby Newman, Robert C.<br/>Author Newman, Robert C.<br/>Format: Books<br/>Call Number QA76.9.D314 N48 2010<br/>Publisher Jones & Bartlett Publishers,<br/>Publication Date 2010<br/>ISBN 9780763759940<br/>The effects of windows service packs on port scanningent://SD_ILS/0/SD_ILS:6040982024-04-23T13:44:54Z2024-04-23T13:44:54Zby Wan Mohd. Said Wan Othman, 1966-<br/>Author Wan Mohd. Said Wan Othman, 1966-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 020835 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Analysis of effectiveness of honeypots in tracking botnetsent://SD_ILS/0/SD_ILS:6041022024-04-23T13:44:54Z2024-04-23T13:44:54Zby Mohammad Jorjor Zadeh Shooshtari, 1974-<br/>Author Mohammad Jorjor Zadeh Shooshtari, 1974-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019852 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Hashing in computer science : fifty years of slicing and dicingent://SD_ILS/0/SD_ILS:6396362024-04-23T13:44:54Z2024-04-23T13:44:54Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.H36 K65 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780470344736<br/>Safety of computer architecturesent://SD_ILS/0/SD_ILS:6397172024-04-23T13:44:54Z2024-04-23T13:44:54Zby Boulanger, Jean-Louis<br/>Author Boulanger, Jean-Louis<br/>Format: Books<br/>Call Number QA76.9.A73 S244 2010<br/>Publisher ISTE ;<br/>Publication Date 2010<br/>ISBN 9781848211971<br/>Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:6404622024-04-23T13:44:54Z2024-04-23T13:44:54Zby Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>Secure and resilient software developmentent://SD_ILS/0/SD_ILS:7363042024-04-23T13:44:54Z2024-04-23T13:44:54Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Raghavan, Lakshmikanth<br/>Format: Books<br/>Call Number QA76.76 .D47 M466 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439826966<br/>Guide to computer forensics and investigations[electronic resource]ent://SD_ILS/0/SD_ILS:7363682024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nelson, Bill<br/>Author Nelson, Bill, Philips, Amelia, Steuart, Chris<br/>Format: Books<br/>Call Number CP 023512<br/>Edition 4th Ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2010 2009<br/>ISBN 9781435498839<br/>File encryption system with digital signature for secure data transferent://SD_ILS/0/SD_ILS:7642782024-04-23T13:44:54Z2024-04-23T13:44:54Zby Muhammad Fauzan Ariffin, 1985-<br/>Author Muhammad Fauzan Ariffin, 1985-, Ahmad Zuri Sha'ameri, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number XX(764278.2)<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Information security risk analysisent://SD_ILS/0/SD_ILS:8042702024-04-23T13:44:54Z2024-04-23T13:44:54Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P445 2010<br/>Edition 3rd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439839560<br/>Guide to computer forensics and investigationsent://SD_ILS/0/SD_ILS:6243452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Nelson, Bill<br/>Author Nelson, Bill, Philips, Amelia, Steuart, Chris<br/>Format: Books<br/>Call Number HV8079.C65 G85 2010<br/>Edition 4th Ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2010 2009<br/>ISBN 9781435498839<br/>Risk analysis and security countermeasure selectionent://SD_ILS/0/SD_ILS:6258452024-04-23T13:44:54Z2024-04-23T13:44:54Zby Norman, Thomas L.<br/>Author Norman, Thomas L.<br/>Format: Books<br/>Call Number HV8290 N67 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781420078701<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-04-23T13:44:54Z2024-04-23T13:44:54Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Relation based access controlent://SD_ILS/0/SD_ILS:6378232024-04-23T13:44:54Z2024-04-23T13:44:54Zby Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:6403462024-04-23T13:44:54Z2024-04-23T13:44:54Zby Trinckes, John J.<br/>Author Trinckes, John J.<br/>Format: Books<br/>Call Number HF5548.37 T75 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439810071<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:6404922024-04-23T13:44:54Z2024-04-23T13:44:54Zby Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>Hybrid detection technique for databases intrusion using SQL injection and insider misuse dataent://SD_ILS/0/SD_ILS:7313072024-04-23T13:44:54Z2024-04-23T13:44:54Zby Aziah Asmawi, 1981-<br/>Author Aziah Asmawi, 1981-, Zailani Mohamed Sidek, supervisor, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A95 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>