Search Results for - Narrowed by: Data protection SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-18T21:19:14Z Data Privacy and GDPR Handbook ent://SD_ILS/0/SD_ILS:887859 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sharma, Sanjay, author<br/>Author&#160;Sharma, Sanjay, author<br/>Format:&#160;Books<br/>Call Number&#160;KJE6071 S53 2020<br/>Edition&#160;First Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9781119594246<br/> Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications ent://SD_ILS/0/SD_ILS:873241 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Song, Houbing, editor<br/>Author&#160;Song, Houbing, editor,&#160;Fink, Glenn A., editor,&#160;Jeschke, Sabina, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S434 2018<br/>Edition&#160;First edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119226048<br/> Privacy and Security Policies in Big Data ent://SD_ILS/0/SD_ILS:866730 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Tamane, Sharvari, 1973-, editor<br/>Author&#160;Tamane, Sharvari, 1973-, editor,&#160;Solanki, Vijender Kumar, 1980-, editor,&#160;Dey, Nilanjan, 1984-, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.B45 P75 2017 f<br/>Publisher&#160;IGI Global, Information Science Reference,<br/>Publication Date&#160;2017<br/>ISBN&#160;9781522524861<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859369 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I27 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859564 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034727 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:859894 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A366 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> Strategic implementation based model on data leakage prevention for insider threats ent://SD_ILS/0/SD_ILS:859455 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Radin Rabiatul Adawiah Radin Abdul Halim, 1982-, author<br/>Author&#160;Radin Rabiatul Adawiah Radin Abdul Halim, 1982-, author,&#160;Azizah Abdul Manaf, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 R33 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Strategic implementation based model on data leakage prevention for insider threats ent://SD_ILS/0/SD_ILS:859456 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Radin Rabiatul Adawiah Radin Abdul Halim, 1982- author<br/>Author&#160;Radin Rabiatul Adawiah Radin Abdul Halim, 1982- author,&#160;Azizah Abdul Manaf, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034753 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:860784 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034789 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> A virus disaster recovery plan framework for academic computing center ent://SD_ILS/0/SD_ILS:825488 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohamed Ismail Gurhan, 1985-<br/>Author&#160;Mohamed Ismail Gurhan, 1985-,&#160;Norafida Ithnin, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 M64 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Identity disintegration mechanism for cardiothoracic information privacy ent://SD_ILS/0/SD_ILS:843724 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Syafiq Samsi, 1990- author<br/>Author&#160;Muhammad Syafiq Samsi, 1990- author,&#160;Shukor Abd Razak, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052124 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:821138 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Scholz, James A.<br/>Author&#160;Scholz, James A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 S34 2014<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781439841594<br/> Information security awareness and training program study on Wahda Bank-Libya ent://SD_ILS/0/SD_ILS:831096 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abubaker Essid Abuhtera, 1966-, author<br/>Author&#160;Abubaker Essid Abuhtera, 1966-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A284 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Information security awareness and training program study on Wahda Bank-Libya ent://SD_ILS/0/SD_ILS:831097 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abubaker Essid Abuhtera, 1966-, author<br/>Author&#160;Abubaker Essid Abuhtera, 1966-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034198 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A virus disaster recovery plan framework for academic computing center ent://SD_ILS/0/SD_ILS:825533 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohamed Ismail Gurhan, 1985-<br/>Author&#160;Mohamed Ismail Gurhan, 1985-,&#160;Norafida Ithnin<br/>Format:&#160;Books<br/>Call Number&#160;CP 050530 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria ent://SD_ILS/0/SD_ILS:825920 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Wadzani Aduwamai Gadzama, 1983-<br/>Author&#160;Wadzani Aduwamai Gadzama, 1983-,&#160;Siti Hajar Othman,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W33 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria ent://SD_ILS/0/SD_ILS:825925 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Wadzani Aduwamai Gadzama, 1983-<br/>Author&#160;Wadzani Aduwamai Gadzama, 1983-,&#160;Siti Hajar Othman<br/>Format:&#160;Books<br/>Call Number&#160;CP 050841 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Total information risk management : maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:838287 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Borek, Alexander<br/>Author&#160;Borek, Alexander,&#160;Parlikad, Ajith K., author,&#160;Webb, Jela, author,&#160;Woodall, Philip, author<br/>Format:&#160;Books<br/>Call Number&#160;HF54.5 T68 2014<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124055476<br/> Analyzing security, trust, and crime in the digital world ent://SD_ILS/0/SD_ILS:841204 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nemati, Hamid R., 1958- editor<br/>Author&#160;Nemati, Hamid R., 1958- editor<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A53 2014 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466648562<br/> Identity disintegration mechanism for cardiothoracic information privacy ent://SD_ILS/0/SD_ILS:843668 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Syafiq Samsi, 1990- author<br/>Author&#160;Muhammad Syafiq Samsi, 1990- author,&#160;Shukor Abd Razak, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M843 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:837295 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Meng-Chow Kang author<br/>Author&#160;Meng-Chow Kang author<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K36 2014<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584303<br/> Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803483 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J54 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Credential purpose-based access control for personal data protection in web-based applications ent://SD_ILS/0/SD_ILS:809106 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norjihan Abdul Ghani, 1977- , author<br/>Author&#160;Norjihan Abdul Ghani, 1977- , author,&#160;Harihodin Selamat,&#160;Zailani Mohamed Sidek, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N676 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebook ent://SD_ILS/0/SD_ILS:811429 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Author&#160;Ahmad Syahrul Anuar Saidi, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A36 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebook ent://SD_ILS/0/SD_ILS:811432 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Author&#160;Ahmad Syahrul Anuar Saidi, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031199 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement secret sharing scheme for data confidentiality and integrity ent://SD_ILS/0/SD_ILS:811576 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Aisha Abdallah Zain Alabdeen, 1988-<br/>Author&#160;Aisha Abdallah Zain Alabdeen, 1988-,&#160;Mazleena Salleh<br/>Format:&#160;Books<br/>Call Number&#160;CP 031152 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Development of metamodel for information security risk management ent://SD_ILS/0/SD_ILS:811646 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-,&#160;Siti Hajar Othman, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M648 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811669 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M379 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Steganography in GIF animated grayscale images ent://SD_ILS/0/SD_ILS:811670 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Massalin Yerlan, 1976-<br/>Author&#160;Massalin Yerlan, 1976-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031190 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803486 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029824 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Credential purpose-based access control for personal data protection in web-based applications ent://SD_ILS/0/SD_ILS:809110 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norjihan Abdul Ghani, 1977-<br/>Author&#160;Norjihan Abdul Ghani, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030699 ra<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement secret sharing scheme for data confidentiality and integrity ent://SD_ILS/0/SD_ILS:811574 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Aisha Abdallah Zain Alabdeen, 1988-<br/>Author&#160;Aisha Abdallah Zain Alabdeen, 1988-,&#160;Mazleena Salleh,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A58 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Alogrithm to prevent and detect insider multi transaction malicious activity in database ent://SD_ILS/0/SD_ILS:811719 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Author&#160;Seyyed Mojtaba Dashti Khavidaki, 1985-,&#160;Imran Ghani, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 S49 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Alogrithm to prevent and detect insider multi transaction malicious activity in database ent://SD_ILS/0/SD_ILS:811720 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Author&#160;Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031177 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Coding ent://SD_ILS/0/SD_ILS:811744 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Alla Talib Mohsin, 1986-<br/>Author&#160;Alla Talib Mohsin, 1986-,&#160;Ghazali Sulong,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A453 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Coding ent://SD_ILS/0/SD_ILS:811746 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Alla Talib Mohsin, 1986-<br/>Author&#160;Alla Talib Mohsin, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031153 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:818448 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Raggo, Michael T., author<br/>Author&#160;Raggo, Michael T., author,&#160;Hosmer, Chet, author,&#160;McGrew, Wesley, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R346 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497435<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:821158 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag,&#160;Hinson, Gary,&#160;Kabay, M.E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439881521<br/> Insider threat risk management framework ent://SD_ILS/0/SD_ILS:793269 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Hafiz Mohd. Ambar, 1986-<br/>Author&#160;Mohd. Hafiz Mohd. Ambar, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028844 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Educational and training model of security awareness on mobile devices for students ent://SD_ILS/0/SD_ILS:793298 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Dzairol Adzriem Din, 1986-<br/>Author&#160;Dzairol Adzriem Din, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D93 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Educational and training model of security awareness on mobile devices for students ent://SD_ILS/0/SD_ILS:793299 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Dzairol Adzriem Din, 1986-<br/>Author&#160;Dzairol Adzriem Din, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028845 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Data governance : how to design, deploy, and sustain an effective data governance program ent://SD_ILS/0/SD_ILS:797957 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ladley, John<br/>Author&#160;Ladley, John<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 L33 2012<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780124158290<br/> A survey of data leakage detection and prevention solutions ent://SD_ILS/0/SD_ILS:808475 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Shabtai, Asaf<br/>Author&#160;Shabtai, Asaf,&#160;Elovici, Yuval,&#160;Rokach, Lior<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S46 2012<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781461420521&#160;9781461420538<br/> Analysing information security threats in healthcare information systems using survival analysis method ent://SD_ILS/0/SD_ILS:779466 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ganthan Narayana Samy, 1977-<br/>Author&#160;Ganthan Narayana Samy, 1977-,&#160;Rabiah Ahmad, supervisor,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G364 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Analysing information security threats in healthcare information system using survival analysis method ent://SD_ILS/0/SD_ILS:779468 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ganthan Narayana Samy, 1977-<br/>Author&#160;Ganthan Narayana Samy, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028040 ra<br/>Publication Date&#160;2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:780002 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Pfleeger, Charles P., 1948-<br/>Author&#160;Pfleeger, Charles P., 1948-,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P45 2012<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780132789462<br/> Cyber security standards, practices and industrial applications : systems and methodologies ent://SD_ILS/0/SD_ILS:772975 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Zubairi, Junaid Ahmed, 1961-<br/>Author&#160;Zubairi, Junaid Ahmed, 1961-,&#160;Mahboob, Athar, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C93 2012 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781609608514&#160;9781609608521&#160;9781609608538<br/> Sistem pengurusan simpanan rekod pelanggan, stok dan staf Grand Spa Hydrotheraphy secara atas talian ent://SD_ILS/0/SD_ILS:787668 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nurhamizah Mohd. Hamka, author<br/>Author&#160;Nurhamizah Mohd. Hamka, author,&#160;Ruhaidah Samsudin, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.M4 N87 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2012<br/> Sistem pengurusan simpanan rekod pelanggan, stok dan staf Grand Spa Hydrotheraphy secara atas talian ent://SD_ILS/0/SD_ILS:787669 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nurhamizah Mohd. Hamka, author<br/>Author&#160;Nurhamizah Mohd. Hamka, author,&#160;Ruhaidah Samsudin, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058374 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2012<br/> A2-Tier data hiding technique using an improved exploiting modification direction method and huffman coding ent://SD_ILS/0/SD_ILS:793238 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ali M-Ahmad, 1980-<br/>Author&#160;Ali M-Ahmad, 1980-,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A456 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> A2-Tier data hiding technique using an improved exploiting modification direction method and huffman coding ent://SD_ILS/0/SD_ILS:793241 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ali M-Ahmad, 1980-<br/>Author&#160;Ali M-Ahmad, 1980-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028758 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Insider threat risk management framework ent://SD_ILS/0/SD_ILS:793268 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Hafiz Mohd. Ambar, 1986-<br/>Author&#160;Mohd. Hafiz Mohd. Ambar, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M646 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security behaviours in enhancing awareness ent://SD_ILS/0/SD_ILS:837590 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sasan Karami Zadeh<br/>Author&#160;Sasan Karami Zadeh,&#160;Zuraini Ismail, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S273 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness framework among clerical staff in islamic religious council ent://SD_ILS/0/SD_ILS:837685 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd Talhah Anuar<br/>Author&#160;Mohd Talhah Anuar,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6438 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security awareness framework among clerical staff in islamic religious council ent://SD_ILS/0/SD_ILS:837686 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd Talhah Anuar<br/>Author&#160;Mohd Talhah Anuar<br/>Format:&#160;Books<br/>Call Number&#160;CP 034141 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information security behaviours in enhancing awareness ent://SD_ILS/0/SD_ILS:837592 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sasan Karami Zadeh<br/>Author&#160;Sasan Karami Zadeh<br/>Format:&#160;Books<br/>Call Number&#160;CP 034152 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Analyzing security behaviour in managing passwords among staffs of community colleges ent://SD_ILS/0/SD_ILS:840505 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Hazila Hasan, 1981-<br/>Author&#160;Hazila Hasan, 1981-,&#160;Mohd. Shahidan Abdullah, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H396 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Information assurance and security ethics in complex systems : interdisciplinary perspectives ent://SD_ILS/0/SD_ILS:630427 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Dark, Melissa Jane, 1961-<br/>Author&#160;Dark, Melissa Jane, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I545 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781616922450&#160;9781616922467<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:777306 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Halpert, Ben, 1986-<br/>Author&#160;Halpert, Ben, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A93 2011<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470874745<br/> Perception on biometric authentication technology among FPPSM students ent://SD_ILS/0/SD_ILS:769589 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Lee, Hong Bee, author<br/>Author&#160;Lee, Hong Bee, author,&#160;Kamaruzzaman Abdul Rahim, supervisor,&#160;Fakulti Pengurusan dan Pembangunan Sumber Manusia<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 L44 2011 raf<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Pengurusan (Pemasaran)) - Universiti Teknologi Malaysia, 2011<br/> Perception on biometric authentication technology among FPPSM students ent://SD_ILS/0/SD_ILS:776052 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Lee, Hong Bee, author<br/>Author&#160;Lee, Hong Bee, author,&#160;Kamaruzzaman Abdul Rahim, supervisor,&#160;Fakulti Pengurusan dan Pembangunan Sumber Manusia<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058054 ra<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Pengurusan (Pemasaran)) - Universiti Teknologi Malaysia, 2011<br/> Online consecutive secure multi-party computation algorithm for preserving privacy ent://SD_ILS/0/SD_ILS:776267 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abdolreza Rasouli Kenari, 1979-<br/>Author&#160;Abdolreza Rasouli Kenari, 1979-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A23 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Online consecutive secure multi-party computation algorithm for preserving privacy ent://SD_ILS/0/SD_ILS:777861 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abdolreza Rasouli Kenari<br/>Author&#160;Abdolreza Rasouli Kenari<br/>Format:&#160;Books<br/>Call Number&#160;CP 028869 ra<br/>Publication Date&#160;2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Information security evaluation : a holistic approach ent://SD_ILS/0/SD_ILS:781151 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Tashi, Igli<br/>Author&#160;Tashi, Igli,&#160;Ghernaouti-Helie, Solange<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T374 2011<br/>Publisher&#160;EFPL Pr.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439879153<br/> Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:363244 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kouns, Jake<br/>Author&#160;Kouns, Jake,&#160;Minoli, Daniel<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K68 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780471762546<br/> Information security management : concepts and practice ent://SD_ILS/0/SD_ILS:736389 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Raggad, Bel G.<br/>Author&#160;Raggad, Bel G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R337 2010<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781420078541<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> The executive MBA in information security ent://SD_ILS/0/SD_ILS:640346 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Trinckes, John J.<br/>Author&#160;Trinckes, John J.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T75 2010<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439810071<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:640492 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Fried, Stephen, 1962-<br/>Author&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F75 2010<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439820162<br/> Enterprise data governance : reference &amp; master data management, semantic modeling ent://SD_ILS/0/SD_ILS:760680 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Bonnet, Pierre, 1967-<br/>Author&#160;Bonnet, Pierre, 1967-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 B66 2010<br/>Publisher&#160;ISTE ; ISTE Ltd.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781848211827<br/> Steganography in digital media : principles, algorithms, and applications ent://SD_ILS/0/SD_ILS:758326 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Fridrich, Jessica<br/>Author&#160;Fridrich, Jessica<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F75 2010<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780521190190<br/> An approach to enhance security awareness on the use of mobile devices ent://SD_ILS/0/SD_ILS:840550 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sabeeh, Ahmed A.<br/>Author&#160;Sabeeh, Ahmed A.,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 S23 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> An approach to enhance security awareness on the use of mobile devices ent://SD_ILS/0/SD_ILS:840552 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sabeeh, Ahmed A.<br/>Author&#160;Sabeeh, Ahmed A.<br/>Format:&#160;Books<br/>Call Number&#160;CP 033984 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Steganography based on utilizing more surrounding pixels ent://SD_ILS/0/SD_ILS:603419 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Masoud Afrakhteh<br/>Author&#160;Masoud Afrakhteh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017368 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Practical approach in evaluating the resistance of stream ciphers against algebraic attacks ent://SD_ILS/0/SD_ILS:396431 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Faidzal Jantan, 1970-<br/>Author&#160;Mohd. Faidzal Jantan, 1970-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M43 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Steganography based on utilizing more surrounding pixels ent://SD_ILS/0/SD_ILS:390257 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Masoud Afrakhteh<br/>Author&#160;Masoud Afrakhteh,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M378 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Prototype development of voip steganography ent://SD_ILS/0/SD_ILS:371786 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-<br/>Author&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-,&#160;Azizah Abd. Manaf,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A22 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Sistem nyah-penyalinan bagi perisian yang dimuat turun menggunakan kaedah pengesahan nombor siri ent://SD_ILS/0/SD_ILS:383010 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nooraisah Abdul Rahman<br/>Author&#160;Nooraisah Abdul Rahman,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.P76 N67 2009 raf<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Sistem nyah-penyalinan bagi perisian yang dimuat turun menggunakan kaedah pengesahan nombor siri ent://SD_ILS/0/SD_ILS:603144 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nooraisah Abdul Rahman<br/>Author&#160;Nooraisah Abdul Rahman<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 027503 ra<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:736397 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Hill, David G. (David Gary), 1943-<br/>Author&#160;Hill, David G. (David Gary), 1943-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H52 2009<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781439806920<br/> Expert SQL server 2008 encryption ent://SD_ILS/0/SD_ILS:640718 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Coles, Michael, 1972-<br/>Author&#160;Coles, Michael, 1972-,&#160;Landrum, Rodney<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C653 2009<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781430224648&#160;9781430224655<br/> Users' perception of the information security policy at Universiti Teknologi Malaysia ent://SD_ILS/0/SD_ILS:590581 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Haniza Sharif, 1967-<br/>Author&#160;Haniza Sharif, 1967-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 018101 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Prototype development of voip steganography ent://SD_ILS/0/SD_ILS:601098 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-<br/>Author&#160;Abdulaleem Zaid Mohammed Al-Othman, 1981-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017146 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> A prototype to evaluate information security awareness level for teacher and student secondary school ent://SD_ILS/0/SD_ILS:601113 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nurul Hidayah Ab. Rahman, 1983-<br/>Author&#160;Nurul Hidayah Ab. Rahman, 1983-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 026663 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Kawalan Maklumat) - Universiti Teknologi Malaysia, 2009<br/> Oracle data guard 11g handbook ent://SD_ILS/0/SD_ILS:624920 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Carpenter, Larry<br/>Author&#160;Carpenter, Larry<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D348 O73 2009<br/>Publisher&#160;Oracle Press/McGraw-Hill,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780071621113<br/> Multimedia forensics and security ent://SD_ILS/0/SD_ILS:282855 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Li, Chang-Tsun<br/>Author&#160;Li, Chang-Tsun<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 M94 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599048697<br/> Hacking exposed 6 : network security secrets and solutions ent://SD_ILS/0/SD_ILS:287480 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M325 2009<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780071613743<br/> Payment card industry data security standard handbook ent://SD_ILS/0/SD_ILS:287562 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Virtue, Timothy M., 1975-<br/>Author&#160;Virtue, Timothy M., 1975-<br/>Format:&#160;Books<br/>Call Number&#160;HG3755.7 V57 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470260463<br/> A prototype to evaluate information security awareness level for teacher and student secondary school ent://SD_ILS/0/SD_ILS:371863 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nurul Hidayah Ab. Rahman, 1983-<br/>Author&#160;Nurul Hidayah Ab. Rahman, 1983-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N45 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:282895 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 B78 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420052855<br/> Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues ent://SD_ILS/0/SD_ILS:331443 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nemati, Hamid R., 1958-<br/>Author&#160;Nemati, Hamid R., 1958-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T43 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781605662107<br/> Users' perception of the information security policy at Universiti Teknologi Malaysia ent://SD_ILS/0/SD_ILS:322536 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Haniza Sharif, 1967-<br/>Author&#160;Haniza Sharif, 1967-,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 H36 2009 raf<br/>Publication Date&#160;2009<br/><a href="http://eprints.utm.my/5291">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives ent://SD_ILS/0/SD_ILS:328129 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Collette, Ronald D.<br/>Author&#160;Collette, Ronald D.,&#160;Gentile, Michael,&#160;Gentile, Skye<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C64 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420089103<br/> Multimedia content encryption : techniques and applications ent://SD_ILS/0/SD_ILS:328182 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Lian, Shiguo<br/>Author&#160;Lian, Shiguo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 L52 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420065275<br/> Steganografi menggunakan imej (menggunakan kaedah LSB) ent://SD_ILS/0/SD_ILS:355364 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Noraishah Abdull Rahman<br/>Author&#160;Siti Noraishah Abdull Rahman,&#160;Ghazali Sulong,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S664 2008 raf<br/>Publication Date&#160;2008<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2008<br/> Steganografi menggunakan imej (menggunakan kaedah LSB) ent://SD_ILS/0/SD_ILS:596682 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Noraishah Abdull Rahman<br/>Author&#160;Siti Noraishah Abdull Rahman<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025941 ra<br/>Publication Date&#160;2008<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2008<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Mastering system center data protection manager 2007 ent://SD_ILS/0/SD_ILS:286619 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ganger, Devin L.<br/>Author&#160;Ganger, Devin L.,&#160;Femling, Ryan, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G36 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470181522<br/> Privacy-preserving data mining : models and algorithms ent://SD_ILS/0/SD_ILS:292409 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Aggarwal, Charu C.<br/>Author&#160;Aggarwal, Charu C.,&#160;Yu, Philip S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 P74 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387709918<br/> Netcat power tools ent://SD_ILS/0/SD_ILS:262949 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kanclirz, Jan<br/>Author&#160;Kanclirz, Jan,&#160;Baskin, Brian<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N33 2008<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781597492577<br/> Computational intelligence in information assurance and security ent://SD_ILS/0/SD_ILS:196712 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nedjah, Nadia<br/>Author&#160;Nedjah, Nadia,&#160;Abraham, Ajith, 1968-,&#160;Mourelle, Luiza de Macedo<br/>Format:&#160;Books<br/>Call Number&#160;Q342 C657 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/> Simple computer security : disinfect your PC ent://SD_ILS/0/SD_ILS:170952 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Geier, Eric, 1984-<br/>Author&#160;Geier, Eric, 1984-,&#160;Geier, James T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G44 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470068540<br/> Information assurance for the enterprise : a roadmap to information security ent://SD_ILS/0/SD_ILS:103417 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Schou, Corey<br/>Author&#160;Schou, Corey,&#160;Shoemaker, Dan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S365 2007<br/>Publisher&#160;McGraw-Hill/Irwin,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780072255249<br/> Digital data integrity : the evolution from passive protection to active management ent://SD_ILS/0/SD_ILS:164005 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Little, David B.<br/>Author&#160;Little, David B.,&#160;Farmer, Skip,&#160;El-Hilali, Oussama<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L57 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470018279<br/> Conceptualising and developing information security awareness and training programme. Case study : Malaysian financial sector ent://SD_ILS/0/SD_ILS:149566 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norashikin Shariff<br/>Author&#160;Norashikin Shariff<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N679 2007 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> Cryptology unlocked ent://SD_ILS/0/SD_ILS:245284 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Wobst, Reinhard<br/>Author&#160;Wobst, Reinhard<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W62 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470060643<br/> Sistem digital serakan spektrum jujukan terus (dsss) dengan menggunakan altera maxplus II ent://SD_ILS/0/SD_ILS:771193 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Rozeha A. Rashid<br/>Author&#160;Rozeha A. Rashid,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R69 2007 af<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>ISBN&#160;9789673537372<br/> K9 web protection ent://SD_ILS/0/SD_ILS:579938 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Geier, Eric, 1984-<br/>Author&#160;Geier, Eric, 1984-,&#160;Geier, James T.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11500<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:301112 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Khadraoui, Djamel<br/>Author&#160;Khadraoui, Djamel,&#160;Herrmann, Francine<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A38 2007<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599040905<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:102187 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Layton, Timothy P.<br/>Author&#160;Layton, Timothy P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 L39 2007<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849370878<br/> Cybersecurity for SCADA systems ent://SD_ILS/0/SD_ILS:195026 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Shaw, William T.<br/>Author&#160;Shaw, William T.<br/>Format:&#160;Books<br/>Call Number&#160;TJ222 S52 2006<br/>Publisher&#160;PennWell Corporation,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781593700683<br/> Privacy protection for e-services ent://SD_ILS/0/SD_ILS:107901 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Yee, George<br/>Author&#160;Yee, George<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 P74 2006<br/>Publisher&#160;Idea Group Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781591409144<br/> Data protection using advanced encryption standard (AES) ent://SD_ILS/0/SD_ILS:109917 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Dhalia Adzim Muhamod Adzim<br/>Author&#160;Siti Dhalia Adzim Muhamod Adzim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S34 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/> The Ciso handbook : a practical guide to securing your company ent://SD_ILS/0/SD_ILS:156649 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Gentile, Mike<br/>Author&#160;Gentile, Mike,&#160;Collette, Ronald D.,&#160;August, Thomas D.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 G46 2006<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849319525<br/> Securing SCADA systems ent://SD_ILS/0/SD_ILS:112146 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Krutz, Ronald L., 1938-<br/>Author&#160;Krutz, Ronald L., 1938-<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K78 2006<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780764597879<br/> Sistem penyembunyian pelbagai format data menggunakan teknik steganografi ent://SD_ILS/0/SD_ILS:114672 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Heikal Othman<br/>Author&#160;Muhammad Heikal Othman,&#160;Md. Asri Ngadi,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M445 2006 raf<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Penyembunyian mesej ke dalam fail audio MP3 melalui teknik steganograpi ent://SD_ILS/0/SD_ILS:119193 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Faisal Nasron<br/>Author&#160;Mohd. Faisal Nasron,&#160;Hazinah Kutty Mammi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M434 2006 raf<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Developing information security policy : case study of Biruni Remote Sensing Center (BRSC) ent://SD_ILS/0/SD_ILS:131670 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohamed. K. Bayoud<br/>Author&#160;Mohamed. K. Bayoud<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M525 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/> Towards a more managable and secure desktop systems ent://SD_ILS/0/SD_ILS:131688 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Shaharin Sulaiman<br/>Author&#160;Shaharin Sulaiman<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S526 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/> Sistem penyembunyian pelbagai format data menggunakan teknik steganografi ent://SD_ILS/0/SD_ILS:563151 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Heikal Othman<br/>Author&#160;Muhammad Heikal Othman<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025886 ra<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Information technology security ent://SD_ILS/0/SD_ILS:490044 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Rahayu Selamat<br/>Author&#160;Siti Rahayu Selamat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 I53 2006<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9789833655472<br/> The security risk assessment handbook : a complete guide for performing security risk assessments ent://SD_ILS/0/SD_ILS:424028 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Landoll, Douglas J.<br/>Author&#160;Landoll, Douglas J.<br/>Format:&#160;Books<br/>Call Number&#160;HE5548.37 L36 2006<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849329982<br/> Hacking exposed cisco networks : cisco security secrets and solutions ent://SD_ILS/0/SD_ILS:466678 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Vladimirov, Andrew A.<br/>Author&#160;Vladimirov, Andrew A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H324 2006<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072259179<br/> Information technology security &amp; risk management ent://SD_ILS/0/SD_ILS:467151 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Slay, Jill<br/>Author&#160;Slay, Jill,&#160;Koronios, Andy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S54 2006<br/>Publisher&#160;John Wiley &amp; Sons Australia,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470805749<br/> Information security risk assessment at JHEV-ATM develop and implementation of risk assessment method ent://SD_ILS/0/SD_ILS:476877 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nik Zalbiha Nik Mat<br/>Author&#160;Nik Zalbiha Nik Mat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 N92 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/> Privacy preserving data mining ent://SD_ILS/0/SD_ILS:271629 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Vaidya, Jaideep<br/>Author&#160;Vaidya, Jaideep,&#160;Clifton, Christopher Wade,&#160;Zhu, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 V35 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387258867<br/> Data security and privacy law : combating cyberthreats ent://SD_ILS/0/SD_ILS:134216 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Cronin, Kevin P.<br/>Author&#160;Cronin, Kevin P.,&#160;Weikers, Ronald N.<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 C76 2006<br/>Publisher&#160;Thomson/West,<br/>Publication Date&#160;2006<br/> Digital preservation ent://SD_ILS/0/SD_ILS:94407 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Deegan, Marilyn<br/>Author&#160;Deegan, Marilyn,&#160;Tanner, Simon<br/>Format:&#160;Books<br/>Call Number&#160;ZA4080 D534 2006<br/>Publisher&#160;Facet Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781856044851<br/> Information assurance : security in the information environment ent://SD_ILS/0/SD_ILS:94547 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Blyth, Andrew, 1966-<br/>Author&#160;Blyth, Andrew, 1966-,&#160;Kovacich, Gerald L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B59 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846282669<br/> IT governance : a managers guide to data security and BS 7799/ISO 17799 ent://SD_ILS/0/SD_ILS:126964 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Calder, Alan, 1957-<br/>Author&#160;Calder, Alan, 1957-,&#160;Watkins, Steve, 1970-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C346 2005<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Kogan Page,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780749446505<br/> A practical guide to security assessments ent://SD_ILS/0/SD_ILS:156664 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kairab, Sudhanshu<br/>Author&#160;Kairab, Sudhanshu<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 K344 2005<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780849317064<br/> Spatial domain technique to embed visible and invisible wetermarking ent://SD_ILS/0/SD_ILS:411665 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Akram Mohd. Zeki<br/>Author&#160;Akram Mohd. Zeki,&#160;Azizah Abdul Manaf,&#160;Sayuthi Jaafar,&#160;International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A37 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Assessing and managing security risk in IT systems : a structured methodology ent://SD_ILS/0/SD_ILS:423080 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;McCumber, John, 1956-<br/>Author&#160;McCumber, John, 1956-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M324 2005<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2005&#160;2004<br/>ISBN&#160;9780849322327<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:444224 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Paquet, Cathrine<br/>Author&#160;Paquet, Cathrine,&#160;Saxe, Warren<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P36 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587201219<br/> Comparing image quality of different steganographic techniques ent://SD_ILS/0/SD_ILS:443512 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Azizah Abdul Manaf<br/>Author&#160;Azizah Abdul Manaf,&#160;Akram Mohd. Zeki,&#160;Sayuthi Jaafar,&#160;Salehuddin A. Kadir,&#160;International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C655 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Implementing database security and auditing : a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:454416 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ben-Natan, Ron<br/>Author&#160;Ben-Natan, Ron<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B46 2005<br/>Publisher&#160;Elsevier Digital Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781555583347<br/> Personal data and privacy protection ent://SD_ILS/0/SD_ILS:483994 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Abdul Raman Saad<br/>Author&#160;Abdul Raman Saad<br/>Format:&#160;Books<br/>Call Number&#160;K3263 A72 2005<br/>Publisher&#160;Malayan Law Journal,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789679626544<br/> Information security policies and procedures : a practitioner's reference ent://SD_ILS/0/SD_ILS:414045 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9.A25P448 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2005&#160;2004<br/>ISBN&#160;9780849319587<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:415511 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.,&#160;Peltier, Justin,&#160;Blackley, John A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P444 2005<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780849319570<br/> Analysis of image quality for steganographic software ent://SD_ILS/0/SD_ILS:454770 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Azizah Abd. Manaf, Prof. Dr.<br/>Author&#160;Azizah Abd. Manaf, Prof. Dr.,&#160;M. Z. Akram,&#160;K. Salehuddin,&#160;Sayuthi Jaafar,&#160;Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A53 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. net ent://SD_ILS/0/SD_ILS:605444 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Syaiful Adli Mohd<br/>Author&#160;Mohd. Syaiful Adli Mohd<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013937<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Information security intelligence : cryptographic principles and applications ent://SD_ILS/0/SD_ILS:607934 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Calabrese, Thomas<br/>Author&#160;Calabrese, Thomas<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5816<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781401837273<br/> Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. net ent://SD_ILS/0/SD_ILS:407899 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Syaiful Adli Mohd<br/>Author&#160;Mohd. Syaiful Adli Mohd<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M79 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Malicious cryptography : exposing cryptovirology ent://SD_ILS/0/SD_ILS:395529 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Young, Adam, 1972-<br/>Author&#160;Young, Adam, 1972-,&#160;Yung, Moti<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9 .A25 Y68 2004<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764549755<br/> Software forensics : collecting evidence from the scene of a digital crime ent://SD_ILS/0/SD_ILS:396182 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Slade, Robert M.<br/>Author&#160;Slade, Robert M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S524 2004<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780071428040<br/> The shellcoder's handbook : discovering and exploiting security holes ent://SD_ILS/0/SD_ILS:404125 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Koziol, Jack<br/>Author&#160;Koziol, Jack<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9.A25 S534 2004<br/>Publisher&#160;Wiley Pubs,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764544682<br/> Information security intelligence : cryptographic principles and applications ent://SD_ILS/0/SD_ILS:420147 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Calabrese, Thomas<br/>Author&#160;Calabrese, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C344 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781401837273<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:420302 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Caloyannides, Michael A.<br/>Author&#160;Caloyannides, Michael A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C345 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580538305<br/> Digital defence what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:226637 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Parenty, Thomas J.<br/>Author&#160;Parenty, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 P37<br/>Publisher&#160;Harvard Business School Press,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781578517794<br/> Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talian ent://SD_ILS/0/SD_ILS:7071 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Farrah Maslina Umar<br/>Author&#160;Farrah Maslina Umar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12994<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC) ent://SD_ILS/0/SD_ILS:362128 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kamal Azizi Mohd. Yasin<br/>Author&#160;Kamal Azizi Mohd. Yasin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K35 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:362382 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N674 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Twofish-based file encryption ent://SD_ILS/0/SD_ILS:379114 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Hatta Kassim<br/>Author&#160;Muhammad Hatta Kassim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M52 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/> Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC) ent://SD_ILS/0/SD_ILS:598013 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kamal Azizi Mohd. Yasin<br/>Author&#160;Kamal Azizi Mohd. Yasin<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5533<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:599953 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5544<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Twofish-based file encryption ent://SD_ILS/0/SD_ILS:601993 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Hatta Kassim<br/>Author&#160;Muhammad Hatta Kassim<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6561<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/> Hacking exposed : network security secrets and solutions ent://SD_ILS/0/SD_ILS:603342 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4128<br/>Edition&#160;4th ed.<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2003<br/> Surviving security : how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:414116 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Andress, Amanda<br/>Author&#160;Andress, Amanda<br/>Format:&#160;Books<br/>Call Number&#160;QA 76.9 .A25 A 52 2003<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780849320422<br/> Hacking exposed : network security secrets &amp; solutions ent://SD_ILS/0/SD_ILS:347395 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;McClure, Stuart<br/>Author&#160;McClure, Stuart,&#160;Scambray, Joel,&#160;Kurtz, George<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M48 2003<br/>Edition&#160;4th ed.<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072227420<br/> Security in computing ent://SD_ILS/0/SD_ILS:340173 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Pfleeger, Charles P.<br/>Author&#160;Pfleeger, Charles P.,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P44 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780130355485&#160;9780131201996<br/> Prototaip pengesahan dan penyahkodan watermarking dalam imej digital ent://SD_ILS/0/SD_ILS:341294 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Lee, Chin Keong<br/>Author&#160;Lee, Chin Keong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L43 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Network security for dummies ent://SD_ILS/0/SD_ILS:325940 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Cobb, Chey<br/>Author&#160;Cobb, Chey<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 C63 2003<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780764516795<br/> Computer and intrusion forensics ent://SD_ILS/0/SD_ILS:341545 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohay, George M., 1945-<br/>Author&#160;Mohay, George M., 1945-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C633 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533690<br/> Data protection strategy : implementing data protection compliance ent://SD_ILS/0/SD_ILS:261419 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Morgan, Richard<br/>Author&#160;Morgan, Richard,&#160;Boardman, Ruth<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 M67 2003<br/>Publisher&#160;Thomson Sweet &amp; Maxwell,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780421838307<br/> Sistem diagnosis penyakit kulit menggunakan pendekatan berasaskan peraturan ent://SD_ILS/0/SD_ILS:8284 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kuang, Yee Ling<br/>Author&#160;Kuang, Yee Ling<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12984<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:167979 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P447 2002<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780849311376<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:11180 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13917<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Key recovery in public key insfrastructure ent://SD_ILS/0/SD_ILS:360484 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A.25 T464 2002 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2002<br/> Safe and secure : secure your home network and protect your privacy online ent://SD_ILS/0/SD_ILS:383782 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Danesh, Arman<br/>Author&#160;Danesh, Arman,&#160;Lau, Felix,&#160;Mehrassa, Ali<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D36 2002<br/>Publisher&#160;Sams,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780672322433<br/> Information assurance : managing organizational IT security risks ent://SD_ILS/0/SD_ILS:756834 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Boyce, Joseph George, 1951-<br/>Author&#160;Boyce, Joseph George, 1951-,&#160;Jennings, Dan Wesley, 1954-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B69 2002<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780750673273<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:596368 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Jones, Keith J.<br/>Author&#160;Jones, Keith J.,&#160;Shema, Mike,&#160;Johnson, Bradley C.<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 2453<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:601002 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8375<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:424029 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Herrmann, Debra S.<br/>Author&#160;Herrmann, Debra S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H474 2002<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2002&#160;2001<br/>ISBN&#160;9780849311635<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:371161 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A44 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Anti-hacker tool kit ent://SD_ILS/0/SD_ILS:345533 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Jones, Keith J.<br/>Author&#160;Jones, Keith J.,&#160;Shema, Mike,&#160;Johnson, Bradley C.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J66 2002<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780072222821<br/> Auditors' introduction to crytography and its application in database security ent://SD_ILS/0/SD_ILS:345848 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> An electronic commerce model utilizing data security technique = Satu model perdagangan elektronik menggunakan teknik keselamatan data ent://SD_ILS/0/SD_ILS:349014 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ab. Razak Che Hussin<br/>Author&#160;Ab. Razak Che Hussin,&#160;Mahadi Bahari,&#160;Halina Mohamed Dahlan,&#160;Rashidah Kadir<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E437 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Aplikasi WAP : pencapaian keputusan semester pelajar dengan integrasi perkhidmatan keselamatan melalui implementasi sistem kripto lengkungan eliptik ent://SD_ILS/0/SD_ILS:308545 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Woo, Wei Leng<br/>Author&#160;Woo, Wei Leng<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5865 W66 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Sistem pemulihan kekunci dalam infrastruktur kekunci umum bagi teleperubatan ent://SD_ILS/0/SD_ILS:308548 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Tan, Kieng Wei<br/>Author&#160;Tan, Kieng Wei<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Sistem perkhidmatan Penguasa Sijil (CA) dan Penguasa Pendaftaran (RA) bagi implementasi Infrastruktur Kekunci Umum (PKI) dalam teleperubatan ent://SD_ILS/0/SD_ILS:309640 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Son, Yeo Yiin<br/>Author&#160;Son, Yeo Yiin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S66 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Building an information security awareness program ent://SD_ILS/0/SD_ILS:313320 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Desman, Mark B<br/>Author&#160;Desman, Mark B<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D47 2002<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780849301162<br/> A novel key recovery scheme implemented in public key infrastructure ent://SD_ILS/0/SD_ILS:316205 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi,&#160;Norbik Bashah Idris,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T48 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection of DoS attacks using intrusion detection sensors ent://SD_ILS/0/SD_ILS:322034 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security guidelines of electronic academic assets ent://SD_ILS/0/SD_ILS:322088 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Sistem penganalisa paket rangkaian ethernet ent://SD_ILS/0/SD_ILS:7275 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Heng, Choon Tai<br/>Author&#160;Heng, Choon Tai<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12589<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Pembelajaran matematik tingkatan satu : topik mempermudahkan hasil tambah dan hasil tolak integer positif dan negatif secara berkomputer ent://SD_ILS/0/SD_ILS:7307 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Aidah Misran<br/>Author&#160;Aidah Misran<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12219<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Removal of organics, nitrogen and phosphorus using membrane bioreactor ent://SD_ILS/0/SD_ILS:8097 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Khor, Swee Loong<br/>Author&#160;Khor, Swee Loong<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Kejuruteraan (Alam Sekitar)) - Universiti Teknologi Malaysia, 2002<br/> Sistem pembangunan multimedia (Mindspark contentcreation studio) ent://SD_ILS/0/SD_ILS:19289 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Lim, Shiau Kean<br/>Author&#160;Lim, Shiau Kean<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11567<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamir ent://SD_ILS/0/SD_ILS:21075 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Azhar Ali<br/>Author&#160;Azhar Ali<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12075<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem maklumat pengurusan dan penerapan konsep pembelajaran secara elektronik bagi Akademi Pendidikan Pemandu (M) Sdn. Bhd. ent://SD_ILS/0/SD_ILS:21288 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Asmahani Kadir<br/>Author&#160;Asmahani Kadir<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11961<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem kaunseling bercirikan keselamatan untuk sekolah bestari : kriptografi lengkungan eliptik ent://SD_ILS/0/SD_ILS:168695 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Herny Ramadhani Mohd Husny Hamid<br/>Author&#160;Herny Ramadhani Mohd Husny Hamid<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 H46 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem keselamatan komunikasi data berkomputer antara PDRM Cawangan Johor Bahru berkonsepkan pelayan pelanggan ent://SD_ILS/0/SD_ILS:169358 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Hafeez Osman<br/>Author&#160;Mohd. Hafeez Osman<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 M52 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem kaunseling bercirikan keselamatan untuk sekolah bistari : pengesahan identiti pengguna ent://SD_ILS/0/SD_ILS:169766 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nor Azlan Muhamed Sulong<br/>Author&#160;Nor Azlan Muhamed Sulong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N673 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem keselamatan komunikasi data berkomputer ent://SD_ILS/0/SD_ILS:161299 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Shahril Ameir Ani<br/>Author&#160;Shahril Ameir Ani<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 S52 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Kejuteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2001<br/> E-learning : pakej pembelajaran asas grafik berkomputer secara online - bab atribut primitif output ent://SD_ILS/0/SD_ILS:610998 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Hafiz Haron<br/>Author&#160;Mohd. Hafiz Haron<br/>Format:&#160;Computer file<br/>Call Number&#160;MFL 11962<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Enkripsi blok pelbagai saiz menggunakan pencampur blok seimbang ent://SD_ILS/0/SD_ILS:297081 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Zura A. Jalil @ Zainuddin<br/>Author&#160;Siti Zura A. Jalil @ Zainuddin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S98 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Thesis (Sarjana Kejuruteraan Elektrik ) - Universiti Teknologi Malaysia, 2001<br/> Making it personal : how to profit from personalization without invading privacy ent://SD_ILS/0/SD_ILS:372180 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kasanoff, Bruce<br/>Author&#160;Kasanoff, Bruce<br/>Format:&#160;Books<br/>Call Number&#160;HF5415.55 K37 2001<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780470843963<br/> Computer forensics and privacy ent://SD_ILS/0/SD_ILS:334182 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Caloyannides, Michael A.<br/>Author&#160;Caloyannides, Michael A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C34 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532839<br/> Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.] ent://SD_ILS/0/SD_ILS:13851 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Chua, Soo Yaw<br/>Author&#160;Chua, Soo Yaw,&#160;Mohd. Suhaizal Md. Kamari,&#160;Mona Effarina Zakaria,&#160;Nik Raihan Nik Omar,&#160;Wan Nur Ilyana Wan Zahari<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10606<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Keselamatan penghantaran maklumat yang fleksibel ent://SD_ILS/0/SD_ILS:17309 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Salbiah Mohd. Nor<br/>Author&#160;Salbiah Mohd. Nor<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12125<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Confidential<br/> Aplikasi sistem keselamatan komunikasi Angkatan Tentera Malaysia ent://SD_ILS/0/SD_ILS:21090 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Azwan Abdul Aziz<br/>Author&#160;Azwan Abdul Aziz<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12123<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi /ATMA, 2000<br/> Aplikasi sistem keselamatan komunikasi Angkatan Tentera Malaysia ent://SD_ILS/0/SD_ILS:158610 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Azwan Abdul Aziz<br/>Author&#160;Azwan Abdul Aziz<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 A98 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi /ATMA, 2000<br/> Security and surveillance automation in an industrial plant ent://SD_ILS/0/SD_ILS:165987 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohamed Najib Ribuan<br/>Author&#160;Mohamed Najib Ribuan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M62 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Sistem capaian data dalam depoh bantuan TLDM ent://SD_ILS/0/SD_ILS:158666 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Khairul Kamarul Ariffin<br/>Author&#160;Khairul Kamarul Ariffin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K52 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Keselamatan penghantaran maklumat yang fleksibel ent://SD_ILS/0/SD_ILS:158932 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Salbiah Mohd. Nor<br/>Author&#160;Salbiah Mohd. Nor<br/>Format:&#160;Books<br/>Call Number&#160;Z103 S24 2000 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Sulit<br/> A traceable proactive anonymous electronic cash ent://SD_ILS/0/SD_ILS:139538 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Security and surveillance automation for a government building ent://SD_ILS/0/SD_ILS:147671 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Yamini Sivashankari S. Sivashunmugam<br/>Author&#160;Yamini Sivashankari S. Sivashunmugam<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y35 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ent://SD_ILS/0/SD_ILS:148035 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Chua, Tee Khoon @ Chua Yong Peng<br/>Author&#160;Chua, Tee Khoon @ Chua Yong Peng<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C58 2000 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Risk analysis guideline for IT environment ent://SD_ILS/0/SD_ILS:123257 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Rabiah Ahmad, Dr.,&#160;Norafida Ithnin,&#160;Subariah Ibrahim,&#160;Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R57 2000<br/>Publication Date&#160;2000<br/> Security control and analysis system ent://SD_ILS/0/SD_ILS:481610 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norbik Bashah Idris<br/>Author&#160;Norbik Bashah Idris,&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Nik Khairul Raja Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;MAK 12825 a<br/>Publication Date&#160;2000<br/> Kriptografi untuk unit pengurusan operasi TLDM ent://SD_ILS/0/SD_ILS:20250 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ayuwati Suraya Abu Bakar<br/>Author&#160;Ayuwati Suraya Abu Bakar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12095<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Sistem pemulihan kunci dengan kaedah medan pemulihan kunci ent://SD_ILS/0/SD_ILS:100618 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Phua, Ooi Ewe<br/>Author&#160;Phua, Ooi Ewe<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P48 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Membangunkan alatan yang membenarkan perkongsian fail di antara Linux dan Windows NT ... [et al.] ent://SD_ILS/0/SD_ILS:13052 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norhamin Amit<br/>Author&#160;Norhamin Amit,&#160;Syukrie Mohd. Nasir,&#160;Wan Saari Wan Alias,&#160;Yuhasliza Mohd. Yusoh,&#160;Yusmariani Mohd. Yusoff<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9508<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Pembangunan pakej kelas maya : kerja dan tenaga KBSM ... [et al.] ent://SD_ILS/0/SD_ILS:13318 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norhaniza Mohamat Sharif<br/>Author&#160;Norhaniza Mohamat Sharif,&#160;Nurul Asikin Ahmad Khairudin,&#160;Phua, Ooi Ewe,&#160;Tun Abd. Karim Tun Abu Bakar,&#160;Rooslaili Kamis<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9424<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Kajian keselamatan data berbantukan agen mobile ent://SD_ILS/0/SD_ILS:101355 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Yuhasliza Mohd. Yusoh<br/>Author&#160;Yuhasliza Mohd. Yusoh<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y83 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Pembangunan sistem pemulihan kunci menggunakan kaedah pengescrowan ent://SD_ILS/0/SD_ILS:469754 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Liew, Chee Wah<br/>Author&#160;Liew, Chee Wah<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L53 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1998<br/> Penyulitan dan penyahsulitan direktori dalam persekitaran windows 95 ent://SD_ILS/0/SD_ILS:469986 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Ong, Yean Hoon<br/>Author&#160;Ong, Yean Hoon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O52 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysai, 1998<br/> Client / server untuk sistem maklumat sekolah bersepadu menggunakan SQL ... [et al.] ent://SD_ILS/0/SD_ILS:7874 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Chandraseegar Krishnan<br/>Author&#160;Chandraseegar Krishnan,&#160;Liew, Chee Wah,&#160;Ong, Yean Hoon,&#160;Wan Raina Wan Yusoff,&#160;Yusniza Yusoff<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9154 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Security in computing ent://SD_ILS/0/SD_ILS:457599 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Pfleeger, Charles P.<br/>Author&#160;Pfleeger, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P44 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780131857940&#160;9780133374865<br/> Protecting business information : a manager's guide ent://SD_ILS/0/SD_ILS:467470 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Schweitzer, James A.<br/>Author&#160;Schweitzer, James A.<br/>Format:&#160;Books<br/>Call Number&#160;HD38.7 S34 1996<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780750696586<br/> The computer privacy handbook ent://SD_ILS/0/SD_ILS:410431 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Bacard, Andre<br/>Author&#160;Bacard, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 1995<br/>Publisher&#160;Peachpit Press,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781566091718<br/> Protection and security on the information superhighway ent://SD_ILS/0/SD_ILS:382662 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Cohen, Frederick B.<br/>Author&#160;Cohen, Frederick B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C63 1995<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1995<br/>ISBN&#160;9780471113898<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336218 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B66 1994 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336220 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;DSK 616 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> Commonsense computer security : your practical guide to information protection ent://SD_ILS/0/SD_ILS:351183 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Smith, Martin<br/>Author&#160;Smith, Martin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S64 1993<br/>Edition&#160;2nd ed<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780077078058<br/> EDP-security ent://SD_ILS/0/SD_ILS:171510 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Frank, Lars<br/>Author&#160;Frank, Lars<br/>Format:&#160;Books<br/>Call Number&#160;QA76 F73 1992<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;1992<br/>ISBN&#160;9780444886088<br/> Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisian ent://SD_ILS/0/SD_ILS:187659 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Voo, Fui Ken<br/>Author&#160;Voo, Fui Ken<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5.V66 1992 raf<br/>Publication Date&#160;1992<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1992<br/> The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisian ent://SD_ILS/0/SD_ILS:271202 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Fauziah Hanim Omar<br/>Author&#160;Fauziah Hanim Omar,&#160;Jasmi Mohd Daron,&#160;Jayaseelan Manickam,&#160;Mohd. Zaki Yahaya,&#160;Ooi, Foong Yen<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7750 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/> Security in computing ent://SD_ILS/0/SD_ILS:236425 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Peleeger, Charles P.<br/>Author&#160;Peleeger, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P44 1989<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780137989430<br/> Introduction to cryptology ent://SD_ILS/0/SD_ILS:173212 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Beckett, Brian<br/>Author&#160;Beckett, Brian<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B42 1988<br/>Publisher&#160;Blackwell Scientific Pub.,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780632022434<br/> Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teks ent://SD_ILS/0/SD_ILS:166770 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Siti Nurliza Mokhtar<br/>Author&#160;Siti Nurliza Mokhtar,&#160;Hendri Dwisatrya Sabir Husin Athar,&#160;Mohd. Nasir A. Rahman,&#160;Zaleha @ Siti Zaleha Yusof,&#160;Zalila Sumari<br/>Format:&#160;Books<br/>Call Number&#160;MFL 3864-3869 ra<br/>Publication Date&#160;1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip ent://SD_ILS/0/SD_ILS:432761 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Salina Salam<br/>Author&#160;Salina Salam<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D37 S34 1988 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Tesis (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum ent://SD_ILS/0/SD_ILS:437074 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Fauziah Abu Mansor<br/>Author&#160;Fauziah Abu Mansor<br/>Format:&#160;Books<br/>Call Number&#160;Z104.F48 1988 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Tesis (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1988<br/> Database security ent://SD_ILS/0/SD_ILS:366894 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Denning, Dorothy Elizabeth Robling<br/>Author&#160;Denning, Dorothy Elizabeth Robling<br/>Format:&#160;Books<br/>Call Number&#160;MAK 14902<br/>Publication Date&#160;1988<br/> Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum; Sistem kawalan pemacuan motor aruhan lelurus; Optimal control design in frequency domain; Versatile auto programmer system; Biomedical telemetry system for freely moving patients; Considerations in technology upgrading; Slow scan TV (SSTV) ent://SD_ILS/0/SD_ILS:8898 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Fauziah Abu Mansor @ Mash-hod<br/>Author&#160;Fauziah Abu Mansor @ Mash-hod,&#160;Nik Din Muhamad,&#160;Chean, Kooi Chyi,&#160;Chua, Poh Cheng,&#160;Nilavarasan Periasamy<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 3914-3920 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia,1988.<br/> A Handbook of computer security ent://SD_ILS/0/SD_ILS:171598 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Hearnden, Keith<br/>Author&#160;Hearnden, Keith<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H363 1987<br/>Publisher&#160;Kogan page,<br/>Publication Date&#160;1987<br/>ISBN&#160;9781850913481<br/> Cryptography and data security ent://SD_ILS/0/SD_ILS:296031 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Denning, Dorothy Elizabeth Robling<br/>Author&#160;Denning, Dorothy Elizabeth Robling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D46 1982<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1983&#160;1982<br/>ISBN&#160;9780201101508<br/> FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:844293 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author&#160;Nor Fazlinda Mohd. Puad, 1980-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 N67 2014 raf<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat)<br/> FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:844294 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author&#160;Nor Fazlinda Mohd. Puad, 1980-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034194 ra<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat)<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:835873 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Peltier , Thomas R author<br/>Author&#160;Peltier , Thomas R author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P454 2014<br/>Edition&#160;Second edition<br/>ISBN&#160;9781439810620<br/> ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD ent://SD_ILS/0/SD_ILS:837878 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Rohaida Ismail, 1984-, author<br/>Author&#160;Rohaida Ismail, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034149 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:839093 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mona Liza Ja'afar, 1975-, author<br/>Author&#160;Mona Liza Ja'afar, 1975-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034541 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> CONCEPTUAL PRIVACY RISK ASSESSMENT MODEL FOR PERSONAL DATA PROTECTION IN AN INSURANCE SYSTEM ent://SD_ILS/0/SD_ILS:839540 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author<br/>Author&#160;Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author,&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 M84 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHM ent://SD_ILS/0/SD_ILS:840459 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sanaz Kavianpour, 1984-, author<br/>Author&#160;Sanaz Kavianpour, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S26 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHM ent://SD_ILS/0/SD_ILS:840460 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sanaz Kavianpour, 1984-, author<br/>Author&#160;Sanaz Kavianpour, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034008 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Information leakage of boolean fuctions and its relationship to other cryptographic criteria ent://SD_ILS/0/SD_ILS:411795 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Zhang, M.<br/>Author&#160;Zhang, M.,&#160;Tavares, S. E.,&#160;Campbell, L. L.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5975<br/> TECHNOLOGY ETHICS IN HANDLING CONFIDENTIAL INFORMATION FOR THE ARMED FORCES ent://SD_ILS/0/SD_ILS:859491 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nor Azreen Zakaria, 1986-, author<br/>Author&#160;Nor Azreen Zakaria, 1986-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;T58.5 N673 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> TECHNOLOGY ETHICS IN HANDLING CONFIDENTIAL INFORMATION FOR THE ARMED FORCES ent://SD_ILS/0/SD_ILS:859492 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nor Azreen Zakaria, 1986-, author<br/>Author&#160;Nor Azreen Zakaria, 1986-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034773 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS FRAMEWORK : A CASE STUDY FOR BANKING EMPLOYEES IN SUDAN ent://SD_ILS/0/SD_ILS:860489 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Merghani Izzedlin Merghani, 1975-, author<br/>Author&#160;Merghani Izzedlin Merghani, 1975-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M476 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILAD ent://SD_ILS/0/SD_ILS:860514 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author&#160;al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H33 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILAD ent://SD_ILS/0/SD_ILS:860950 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author&#160;al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035020 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENT ent://SD_ILS/0/SD_ILS:860951 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Yat, Guo Quan, 1985-, author<br/>Author&#160;Yat, Guo Quan, 1985-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035021 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY AWARENESS MEASURING MODEL FOR EMPLOYEES OF THE SAUDI ARABIAN MONETARY AGENCY (SAMA) ent://SD_ILS/0/SD_ILS:864744 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nawaf Omar Mohammed Basahih, author<br/>Author&#160;Nawaf Omar Mohammed Basahih, author,&#160;Othman Mohd. Yusop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035066 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2016<br/> DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNEL ent://SD_ILS/0/SD_ILS:864747 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nur Alfa Mazlin Masdan, 1981-, author<br/>Author&#160;Nur Alfa Mazlin Masdan, 1981-, author,&#160;Nor Zairah Ab. Rahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035067 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENT ent://SD_ILS/0/SD_ILS:864768 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Luqman Hakim Ibrahim, 1987-, author<br/>Author&#160;Luqman Hakim Ibrahim, 1987-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035071 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCY ent://SD_ILS/0/SD_ILS:864840 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Heng, Yee Lee, 1983-, author<br/>Author&#160;Heng, Yee Lee, 1983-, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H464 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> A FRAMEWORK FOR DATA LEAKAGE AND PREVENTION SOLUTION IN MALAYSIA AIRLINES SYSTEM ent://SD_ILS/0/SD_ILS:865284 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sharifah Izora Farah Syed Marzuki, 1966-, author<br/>Author&#160;Sharifah Izora Farah Syed Marzuki, 1966-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035103 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> EMPLOYEES' AWARENESS TOWARDS IT SECURITY MEASURES IMPLEMENTED IN THEIR ORGANIZATION : SELECTED FINANCIAL INSTITUTION ent://SD_ILS/0/SD_ILS:865465 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Premala Nair Krishnakutty, 1986-, author<br/>Author&#160;Premala Nair Krishnakutty, 1986-, author,&#160;Kamilia Kamardin, Dr., 1982-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P746 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> EMPLOYEES' AWARENESS TOWARDS IT SECURITY MEASURES IMPLEMENTED IN THEIR ORGANIZATION : SELECTED FINANCIAL INSTITUTION ent://SD_ILS/0/SD_ILS:865705 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Premala Nair Krishnakutty, 1986-, author<br/>Author&#160;Premala Nair Krishnakutty, 1986-, author,&#160;Kamilia Kamardin, Dr., 1982-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035118 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATION ent://SD_ILS/0/SD_ILS:870828 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sanaz Kavianpour, 1984-, author<br/>Author&#160;Sanaz Kavianpour, 1984-, author,&#160;Zuraini Ismail, Assoc. Prof. Dr., supervisor,&#160;Bharanidharan Shanmugam, Dr., supervisor,&#160;Mohd. Shahidan Abdullah, Assoc. Prof. Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HM742 S26 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/> ENHANCING DATA PRIVACY IN REMOTE MONITORING OF HYPERTENSION/HYPOTENSION PATIENTS USING AES ALGORITHM ent://SD_ILS/0/SD_ILS:871009 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Deepa Rajandran, 1986-, author<br/>Author&#160;Deepa Rajandran, 1986-, author,&#160;Kamilia Kamardin, Dr., 1982-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D447 2016 raf<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2016<br/> FACTORS INFLUENCING DATA LEAKAGE BEHAVIOUR IN MALAYSIAN ARMED FORCES ent://SD_ILS/0/SD_ILS:871272 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mohd. Nazrul Mat Zom, 1985-, author<br/>Author&#160;Mohd. Nazrul Mat Zom, 1985-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6433 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> ASSESSMENT ON DATA LEAKAGE PROTECTION FOR CHIEF GOVERMENT SECURITY OFFICE ent://SD_ILS/0/SD_ILS:871273 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Kumarendren Rajendran, 1980-, author<br/>Author&#160;Kumarendren Rajendran, 1980-, author,&#160;Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K86 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANY ent://SD_ILS/0/SD_ILS:871283 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Hairunnazri Haron, 1985-, author<br/>Author&#160;Hairunnazri Haron, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H35 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATION ent://SD_ILS/0/SD_ILS:871288 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norshatela Anuar, 1985-, author<br/>Author&#160;Norshatela Anuar, 1985-, author,&#160;Nilam Nur Amir Sjarif, Dr., 1986-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N671 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> USERS' AWARENESS OF MULTIMEDIA CONTENT PROTECTION ent://SD_ILS/0/SD_ILS:836336 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Roslinda Muda, 1977-, author<br/>Author&#160;Roslinda Muda, 1977-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 R676 2011 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> The Complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:837298 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Raghunathan, Balaji author<br/>Author&#160;Raghunathan, Balaji author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R348 2013<br/>ISBN&#160;9781439877302<br/> MODELLING OF PRIVACY PROTECTION IN SOCIAL NETWORKING USERS' WILLINGNESS TO PROVIDE PERSONAL INFORMATION ent://SD_ILS/0/SD_ILS:837868 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nur Farhana Jalalluddin, 1988-, author<br/>Author&#160;Nur Farhana Jalalluddin, 1988-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 N87 2013 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> MODELLING OF PRIVACY PROTECTION IN SOCIAL NETWORKING USERS' WILLINGNESS TO PROVIDE PERSONAL INFORMATION ent://SD_ILS/0/SD_ILS:837869 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nur Farhana Jalalluddin, 1988-, author<br/>Author&#160;Nur Farhana Jalalluddin, 1988-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034147 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD ent://SD_ILS/0/SD_ILS:837877 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Rohaida Ismail, 1984-, author<br/>Author&#160;Rohaida Ismail, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R643 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:839092 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mona Liza Ja'afar, 1975-, author<br/>Author&#160;Mona Liza Ja'afar, 1975-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 M663 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> Analyzing security behaviour in managing passwords among staffs of community colleges ent://SD_ILS/0/SD_ILS:840506 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Hazila Hasan, 1981-<br/>Author&#160;Hazila Hasan, 1981-,&#160;Mohd. Shahidan Abdullah, Dr.,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;CP 033991 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> INFORMATION SECURITY AWARENESS : CASE STUDY IN UNIVERSAL STOCK-BROKING ent://SD_ILS/0/SD_ILS:859308 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Faizatul Akma Mohd. Adnan, 1984-, author<br/>Author&#160;Faizatul Akma Mohd. Adnan, 1984-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia,2014<br/> AN EFFECTIVE MODEL TO MEASURE STUDENTS&rsquo; AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCE ent://SD_ILS/0/SD_ILS:859336 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author&#160;al-Idriss, Sultan Faydullah M., 1987-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S858 2014 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/> AN EFFECTIVE MODEL TO MEASURE STUDENTS&rsquo; AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCE ent://SD_ILS/0/SD_ILS:859605 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author&#160;al-Idriss, Sultan Faydullah M., 1987-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034735 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/> INFORMATION SECURITY AWARENESS : CASE STUDY IN UNIVERSAL STOCK-BROKING ent://SD_ILS/0/SD_ILS:859615 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Faizatul Akma Mohd. Adnan, 1984-, author<br/>Author&#160;Faizatul Akma Mohd. Adnan, 1984-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034736 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia,2014<br/> INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENT ent://SD_ILS/0/SD_ILS:860569 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Yat, Guo Quan, 1985-, author<br/>Author&#160;Yat, Guo Quan, 1985-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8855 Y38 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY AWARENESS FRAMEWORK : A CASE STUDY FOR BANKING EMPLOYEES IN SUDAN ent://SD_ILS/0/SD_ILS:860991 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Merghani Izzedlin Merghani, 1975-, author<br/>Author&#160;Merghani Izzedlin Merghani, 1975-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035036 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Framework ent://SD_ILS/0/SD_ILS:862737 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Heng, Shun Ling, author<br/>Author&#160;Heng, Shun Ling, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H46 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Framework ent://SD_ILS/0/SD_ILS:862939 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Heng, Shun Ling, author<br/>Author&#160;Heng, Shun Ling, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035044 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> A FRAMEWORK FOR DATA STORAGE SECURITY IN CLOUD COMPUTING RELATING TO DATA INTEGRITY, PRIVACY AND TRUST ent://SD_ILS/0/SD_ILS:864667 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Negin Mirjafari, 1991-, author<br/>Author&#160;Negin Mirjafari, 1991-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 N44 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY AWARENESS MEASURING MODEL FOR EMPLOYEES OF THE SAUDI ARABIAN MONETARY AGENCY (SAMA) ent://SD_ILS/0/SD_ILS:864670 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nawaf Omar Mohammed Basahih, author<br/>Author&#160;Nawaf Omar Mohammed Basahih, author,&#160;Othman Mohd. Yusop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N393 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2016<br/> DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNEL ent://SD_ILS/0/SD_ILS:864671 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Nur Alfa Mazlin Masdan, 1981-, author<br/>Author&#160;Nur Alfa Mazlin Masdan, 1981-, author,&#160;Nor Zairah Ab. Rahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 N873 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENT ent://SD_ILS/0/SD_ILS:864673 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Luqman Hakim Ibrahim, 1987-, author<br/>Author&#160;Luqman Hakim Ibrahim, 1987-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L87 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> A FRAMEWORK FOR DATA STORAGE SECURITY IN CLOUD COMPUTING RELATING TO DATA INTEGRITY, PRIVACY AND TRUST ent://SD_ILS/0/SD_ILS:864737 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Negin Mirjafari, 1991-, author<br/>Author&#160;Negin Mirjafari, 1991-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035064 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> A FRAMEWORK FOR DATA LEAKAGE AND PREVENTION SOLUTION IN MALAYSIA AIRLINES SYSTEM ent://SD_ILS/0/SD_ILS:864976 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Sharifah Izora Farah Syed Marzuki, 1966-, author<br/>Author&#160;Sharifah Izora Farah Syed Marzuki, 1966-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 S53 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> AWARENESS IMPLEMENTATION DATA LEAKAGE FOR THE CLOUD SECURITY IN UNIVERSITI TEKNOLOGI MALAYSIA (UTM) ent://SD_ILS/0/SD_ILS:864983 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mazliza Aini Abdul Majid, 1979-, author<br/>Author&#160;Mazliza Aini Abdul Majid, 1979-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 M39 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCY ent://SD_ILS/0/SD_ILS:865102 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Heng, Yee Lee, 1983-, author<br/>Author&#160;Heng, Yee Lee, 1983-, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035090 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> AWARENESS IMPLEMENTATION DATA LEAKAGE FOR THE CLOUD SECURITY IN UNIVERSITI TEKNOLOGI MALAYSIA (UTM) ent://SD_ILS/0/SD_ILS:865287 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Mazliza Aini Abdul Majid, 1979-, author<br/>Author&#160;Mazliza Aini Abdul Majid, 1979-, author,&#160;Saiful Adli Ismail, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035106 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> POLICY GUIDELINES TO IMPROVE DATA GOVERNANCE IN UNIVERSITY COLLEGE OF AGROSCIENCE MALAYSIA : A CASE STUDY ent://SD_ILS/0/SD_ILS:866023 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Rohayu A. Wahid, 1979-, author<br/>Author&#160;Rohayu A. Wahid, 1979-, author,&#160;Norbik Bashah Idris, Prof.Dato'.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R64 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATION ent://SD_ILS/0/SD_ILS:872121 2024-05-18T21:19:14Z 2024-05-18T21:19:14Z by&#160;Norshatela Anuar, 1985-, author<br/>Author&#160;Norshatela Anuar, 1985-, author,&#160;Nilam Nur Amir Sjarif, Dr., 1986-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064085 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>