Search Results for - Narrowed by: Data protectionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-18T21:19:14ZData Privacy and GDPR Handbookent://SD_ILS/0/SD_ILS:8878592024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sharma, Sanjay, author<br/>Author Sharma, Sanjay, author<br/>Format: Books<br/>Call Number KJE6071 S53 2020<br/>Edition First Edition<br/>Publication Date 2020<br/>ISBN 9781119594246<br/>Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applicationsent://SD_ILS/0/SD_ILS:8732412024-05-18T21:19:14Z2024-05-18T21:19:14Zby Song, Houbing, editor<br/>Author Song, Houbing, editor, Fink, Glenn A., editor, Jeschke, Sabina, editor<br/>Format: Books<br/>Call Number TK5105.59 S434 2018<br/>Edition First edition<br/>Publication Date 2018<br/>ISBN 9781119226048<br/>Privacy and Security Policies in Big Dataent://SD_ILS/0/SD_ILS:8667302024-05-18T21:19:14Z2024-05-18T21:19:14Zby Tamane, Sharvari, 1973-, editor<br/>Author Tamane, Sharvari, 1973-, editor, Solanki, Vijender Kumar, 1980-, editor, Dey, Nilanjan, 1984-, editor<br/>Format: Books<br/>Call Number QA76.9.B45 P75 2017 f<br/>Publisher IGI Global, Information Science Reference,<br/>Publication Date 2017<br/>ISBN 9781522524861<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8593692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 I27 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8595642024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034727 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8598942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A366 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-05-18T21:19:14Z2024-05-18T21:19:14Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>Strategic implementation based model on data leakage prevention for insider threatsent://SD_ILS/0/SD_ILS:8594552024-05-18T21:19:14Z2024-05-18T21:19:14Zby Radin Rabiatul Adawiah Radin Abdul Halim, 1982-, author<br/>Author Radin Rabiatul Adawiah Radin Abdul Halim, 1982-, author, Azizah Abdul Manaf, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.D314 R33 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Strategic implementation based model on data leakage prevention for insider threatsent://SD_ILS/0/SD_ILS:8594562024-05-18T21:19:14Z2024-05-18T21:19:14Zby Radin Rabiatul Adawiah Radin Abdul Halim, 1982- author<br/>Author Radin Rabiatul Adawiah Radin Abdul Halim, 1982- author, Azizah Abdul Manaf, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034753 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8607842024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034789 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8254882024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.76.C68 M64 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Identity disintegration mechanism for cardiothoracic information privacyent://SD_ILS/0/SD_ILS:8437242024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Syafiq Samsi, 1990- author<br/>Author Muhammad Syafiq Samsi, 1990- author, Shukor Abd Razak, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052124 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-05-18T21:19:14Z2024-05-18T21:19:14Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:8211382024-05-18T21:19:14Z2024-05-18T21:19:14Zby Scholz, James A.<br/>Author Scholz, James A.<br/>Format: Books<br/>Call Number QA76.9.D314 S34 2014<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781439841594<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310962024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A284 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310972024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034198 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8255332024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin<br/>Format: Books<br/>Call Number CP 050530 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259202024-05-18T21:19:14Z2024-05-18T21:19:14Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 W33 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259252024-05-18T21:19:14Z2024-05-18T21:19:14Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman<br/>Format: Books<br/>Call Number CP 050841 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Total information risk management : maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:8382872024-05-18T21:19:14Z2024-05-18T21:19:14Zby Borek, Alexander<br/>Author Borek, Alexander, Parlikad, Ajith K., author, Webb, Jela, author, Woodall, Philip, author<br/>Format: Books<br/>Call Number HF54.5 T68 2014<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2014<br/>ISBN 9780124055476<br/>Analyzing security, trust, and crime in the digital worldent://SD_ILS/0/SD_ILS:8412042024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nemati, Hamid R., 1958- editor<br/>Author Nemati, Hamid R., 1958- editor<br/>Format: Books<br/>Call Number HF5548.37 A53 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466648562<br/>Identity disintegration mechanism for cardiothoracic information privacyent://SD_ILS/0/SD_ILS:8436682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Syafiq Samsi, 1990- author<br/>Author Muhammad Syafiq Samsi, 1990- author, Shukor Abd Razak, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M843 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Responsive security : be ready to be secureent://SD_ILS/0/SD_ILS:8372952024-05-18T21:19:14Z2024-05-18T21:19:14Zby Meng-Chow Kang author<br/>Author Meng-Chow Kang author<br/>Format: Books<br/>Call Number HF5548.37 K36 2014<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466584303<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034832024-05-18T21:19:14Z2024-05-18T21:19:14Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 J54 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Credential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091062024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norjihan Abdul Ghani, 1977- , author<br/>Author Norjihan Abdul Ghani, 1977- , author, Harihodin Selamat, Zailani Mohamed Sidek, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N676 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114292024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A36 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114322024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-<br/>Format: Books<br/>Call Number CP 031199 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement secret sharing scheme for data confidentiality and integrityent://SD_ILS/0/SD_ILS:8115762024-05-18T21:19:14Z2024-05-18T21:19:14Zby Aisha Abdallah Zain Alabdeen, 1988-<br/>Author Aisha Abdallah Zain Alabdeen, 1988-, Mazleena Salleh<br/>Format: Books<br/>Call Number CP 031152 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Development of metamodel for information security risk managementent://SD_ILS/0/SD_ILS:8116462024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author Mohammed Salem Mohammed Ba Muqabel, 1988-, Siti Hajar Othman, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M648 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M379 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-<br/>Format: Books<br/>Call Number CP 031190 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034862024-05-18T21:19:14Z2024-05-18T21:19:14Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-<br/>Format: Books<br/>Call Number CP 029824 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-05-18T21:19:14Z2024-05-18T21:19:14Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Credential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091102024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norjihan Abdul Ghani, 1977-<br/>Author Norjihan Abdul Ghani, 1977-<br/>Format: Books<br/>Call Number CP 030699 ra<br/>Publication Date 2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement secret sharing scheme for data confidentiality and integrityent://SD_ILS/0/SD_ILS:8115742024-05-18T21:19:14Z2024-05-18T21:19:14Zby Aisha Abdallah Zain Alabdeen, 1988-<br/>Author Aisha Abdallah Zain Alabdeen, 1988-, Mazleena Salleh, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A58 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Alogrithm to prevent and detect insider multi transaction malicious activity in databaseent://SD_ILS/0/SD_ILS:8117192024-05-18T21:19:14Z2024-05-18T21:19:14Zby Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Author Seyyed Mojtaba Dashti Khavidaki, 1985-, Imran Ghani, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.D314 S49 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Alogrithm to prevent and detect insider multi transaction malicious activity in databaseent://SD_ILS/0/SD_ILS:8117202024-05-18T21:19:14Z2024-05-18T21:19:14Zby Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Author Seyyed Mojtaba Dashti Khavidaki, 1985-<br/>Format: Books<br/>Call Number CP 031177 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A453 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117462024-05-18T21:19:14Z2024-05-18T21:19:14Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-<br/>Format: Books<br/>Call Number CP 031153 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:8184482024-05-18T21:19:14Z2024-05-18T21:19:14Zby Raggo, Michael T., author<br/>Author Raggo, Michael T., author, Hosmer, Chet, author, McGrew, Wesley, editor<br/>Format: Books<br/>Call Number QA76.9.A25 R346 2013<br/>Edition 1st ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497435<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:8211582024-05-18T21:19:14Z2024-05-18T21:19:14Zby Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>Insider threat risk management frameworkent://SD_ILS/0/SD_ILS:7932692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Hafiz Mohd. Ambar, 1986-<br/>Author Mohd. Hafiz Mohd. Ambar, 1986-<br/>Format: Books<br/>Call Number CP 028844 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Educational and training model of security awareness on mobile devices for studentsent://SD_ILS/0/SD_ILS:7932982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Dzairol Adzriem Din, 1986-<br/>Author Dzairol Adzriem Din, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 D93 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Educational and training model of security awareness on mobile devices for studentsent://SD_ILS/0/SD_ILS:7932992024-05-18T21:19:14Z2024-05-18T21:19:14Zby Dzairol Adzriem Din, 1986-<br/>Author Dzairol Adzriem Din, 1986-<br/>Format: Books<br/>Call Number CP 028845 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Data governance : how to design, deploy, and sustain an effective data governance programent://SD_ILS/0/SD_ILS:7979572024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ladley, John<br/>Author Ladley, John<br/>Format: Books<br/>Call Number T58.64 L33 2012<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2012<br/>ISBN 9780124158290<br/>A survey of data leakage detection and prevention solutionsent://SD_ILS/0/SD_ILS:8084752024-05-18T21:19:14Z2024-05-18T21:19:14Zby Shabtai, Asaf<br/>Author Shabtai, Asaf, Elovici, Yuval, Rokach, Lior<br/>Format: Books<br/>Call Number QA76.9.A25 S46 2012<br/>Publisher Springer,<br/>Publication Date 2012<br/>ISBN 9781461420521 9781461420538<br/>Analysing information security threats in healthcare information systems using survival analysis methodent://SD_ILS/0/SD_ILS:7794662024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ganthan Narayana Samy, 1977-<br/>Author Ganthan Narayana Samy, 1977-, Rabiah Ahmad, supervisor, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 G364 2012 raf<br/>Publication Date 2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Analysing information security threats in healthcare information system using survival analysis methodent://SD_ILS/0/SD_ILS:7794682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ganthan Narayana Samy, 1977-<br/>Author Ganthan Narayana Samy, 1977-<br/>Format: Books<br/>Call Number CP 028040 ra<br/>Publication Date 2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:7800022024-05-18T21:19:14Z2024-05-18T21:19:14Zby Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-05-18T21:19:14Z2024-05-18T21:19:14Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>Sistem pengurusan simpanan rekod pelanggan, stok dan staf Grand Spa Hydrotheraphy secara atas talianent://SD_ILS/0/SD_ILS:7876682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nurhamizah Mohd. Hamka, author<br/>Author Nurhamizah Mohd. Hamka, author, Ruhaidah Samsudin, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK7895.M4 N87 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2012<br/>Sistem pengurusan simpanan rekod pelanggan, stok dan staf Grand Spa Hydrotheraphy secara atas talianent://SD_ILS/0/SD_ILS:7876692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nurhamizah Mohd. Hamka, author<br/>Author Nurhamizah Mohd. Hamka, author, Ruhaidah Samsudin, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Electronic Resources<br/>Call Number CP 058374 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains Komputer (Kejuruteraan Perisian)) - Universiti Teknologi Malaysia, 2012<br/>A2-Tier data hiding technique using an improved exploiting modification direction method and huffman codingent://SD_ILS/0/SD_ILS:7932382024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ali M-Ahmad, 1980-<br/>Author Ali M-Ahmad, 1980-, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A456 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>A2-Tier data hiding technique using an improved exploiting modification direction method and huffman codingent://SD_ILS/0/SD_ILS:7932412024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ali M-Ahmad, 1980-<br/>Author Ali M-Ahmad, 1980-<br/>Format: Books<br/>Call Number CP 028758 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Insider threat risk management frameworkent://SD_ILS/0/SD_ILS:7932682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Hafiz Mohd. Ambar, 1986-<br/>Author Mohd. Hafiz Mohd. Ambar, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M646 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375902024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh, Zuraini Ismail, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 S273 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376852024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6438 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376862024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar<br/>Format: Books<br/>Call Number CP 034141 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375922024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh<br/>Format: Books<br/>Call Number CP 034152 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Analyzing security behaviour in managing passwords among staffs of community collegesent://SD_ILS/0/SD_ILS:8405052024-05-18T21:19:14Z2024-05-18T21:19:14Zby Hazila Hasan, 1981-<br/>Author Hazila Hasan, 1981-, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 H396 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information assurance and security ethics in complex systems : interdisciplinary perspectivesent://SD_ILS/0/SD_ILS:6304272024-05-18T21:19:14Z2024-05-18T21:19:14Zby Dark, Melissa Jane, 1961-<br/>Author Dark, Melissa Jane, 1961-<br/>Format: Books<br/>Call Number QA76.9.A25 I545 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781616922450 9781616922467<br/>Auditing cloud computing : a security and privacy guideent://SD_ILS/0/SD_ILS:7773062024-05-18T21:19:14Z2024-05-18T21:19:14Zby Halpert, Ben, 1986-<br/>Author Halpert, Ben, 1986-<br/>Format: Books<br/>Call Number HF5548.37 A93 2011<br/>Publisher John Wiley & Sons,<br/>Publication Date 2011<br/>ISBN 9780470874745<br/>Perception on biometric authentication technology among FPPSM studentsent://SD_ILS/0/SD_ILS:7695892024-05-18T21:19:14Z2024-05-18T21:19:14Zby Lee, Hong Bee, author<br/>Author Lee, Hong Bee, author, Kamaruzzaman Abdul Rahim, supervisor, Fakulti Pengurusan dan Pembangunan Sumber Manusia<br/>Format: Books<br/>Call Number HF5548.37 L44 2011 raf<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Pengurusan (Pemasaran)) - Universiti Teknologi Malaysia, 2011<br/>Perception on biometric authentication technology among FPPSM studentsent://SD_ILS/0/SD_ILS:7760522024-05-18T21:19:14Z2024-05-18T21:19:14Zby Lee, Hong Bee, author<br/>Author Lee, Hong Bee, author, Kamaruzzaman Abdul Rahim, supervisor, Fakulti Pengurusan dan Pembangunan Sumber Manusia<br/>Format: Electronic Resources<br/>Call Number CP 058054 ra<br/>Publication Date 2011<br/>Project Paper (Sarjana Muda Pengurusan (Pemasaran)) - Universiti Teknologi Malaysia, 2011<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7762672024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abdolreza Rasouli Kenari, 1979-<br/>Author Abdolreza Rasouli Kenari, 1979-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2011 raf<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7778612024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abdolreza Rasouli Kenari<br/>Author Abdolreza Rasouli Kenari<br/>Format: Books<br/>Call Number CP 028869 ra<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Information security evaluation : a holistic approachent://SD_ILS/0/SD_ILS:7811512024-05-18T21:19:14Z2024-05-18T21:19:14Zby Tashi, Igli<br/>Author Tashi, Igli, Ghernaouti-Helie, Solange<br/>Format: Books<br/>Call Number TK5105.59 T374 2011<br/>Publisher EFPL Pr.,<br/>Publication Date 2011<br/>ISBN 9781439879153<br/>Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:3632442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kouns, Jake<br/>Author Kouns, Jake, Minoli, Daniel<br/>Format: Books<br/>Call Number HF5548.37 K68 2010<br/>Publisher John Wiley & Sons,<br/>Publication Date 2010<br/>ISBN 9780471762546<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:7363892024-05-18T21:19:14Z2024-05-18T21:19:14Zby Raggad, Bel G.<br/>Author Raggad, Bel G.<br/>Format: Books<br/>Call Number QA76.9.A25 R337 2010<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2010<br/>ISBN 9781420078541<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-05-18T21:19:14Z2024-05-18T21:19:14Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:6403462024-05-18T21:19:14Z2024-05-18T21:19:14Zby Trinckes, John J.<br/>Author Trinckes, John J.<br/>Format: Books<br/>Call Number HF5548.37 T75 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439810071<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:6404922024-05-18T21:19:14Z2024-05-18T21:19:14Zby Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>Enterprise data governance : reference & master data management, semantic modelingent://SD_ILS/0/SD_ILS:7606802024-05-18T21:19:14Z2024-05-18T21:19:14Zby Bonnet, Pierre, 1967-<br/>Author Bonnet, Pierre, 1967-<br/>Format: Books<br/>Call Number HF5548.37 B66 2010<br/>Publisher ISTE ; ISTE Ltd.,<br/>Publication Date 2010<br/>ISBN 9781848211827<br/>Steganography in digital media : principles, algorithms, and applicationsent://SD_ILS/0/SD_ILS:7583262024-05-18T21:19:14Z2024-05-18T21:19:14Zby Fridrich, Jessica<br/>Author Fridrich, Jessica<br/>Format: Books<br/>Call Number QA76.9.A25 F75 2010<br/>Publisher Cambridge University Press,<br/>Publication Date 2010<br/>ISBN 9780521190190<br/>An approach to enhance security awareness on the use of mobile devicesent://SD_ILS/0/SD_ILS:8405502024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sabeeh, Ahmed A.<br/>Author Sabeeh, Ahmed A., Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HF5548.37 S23 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>An approach to enhance security awareness on the use of mobile devicesent://SD_ILS/0/SD_ILS:8405522024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sabeeh, Ahmed A.<br/>Author Sabeeh, Ahmed A.<br/>Format: Books<br/>Call Number CP 033984 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:6034192024-05-18T21:19:14Z2024-05-18T21:19:14Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017368 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Practical approach in evaluating the resistance of stream ciphers against algebraic attacksent://SD_ILS/0/SD_ILS:3964312024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Faidzal Jantan, 1970-<br/>Author Mohd. Faidzal Jantan, 1970-, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M43 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Steganography based on utilizing more surrounding pixelsent://SD_ILS/0/SD_ILS:3902572024-05-18T21:19:14Z2024-05-18T21:19:14Zby Masoud Afrakhteh<br/>Author Masoud Afrakhteh, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M378 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Prototype development of voip steganographyent://SD_ILS/0/SD_ILS:3717862024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, Azizah Abd. Manaf, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HF5548.37 A22 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Sistem nyah-penyalinan bagi perisian yang dimuat turun menggunakan kaedah pengesahan nombor sirient://SD_ILS/0/SD_ILS:3830102024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nooraisah Abdul Rahman<br/>Author Nooraisah Abdul Rahman, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.76.P76 N67 2009 raf<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Sistem nyah-penyalinan bagi perisian yang dimuat turun menggunakan kaedah pengesahan nombor sirient://SD_ILS/0/SD_ILS:6031442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nooraisah Abdul Rahman<br/>Author Nooraisah Abdul Rahman<br/>Format: Computer file<br/>Call Number CP 027503 ra<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:7363972024-05-18T21:19:14Z2024-05-18T21:19:14Zby Hill, David G. (David Gary), 1943-<br/>Author Hill, David G. (David Gary), 1943-<br/>Format: Books<br/>Call Number QA76.9.A25 H52 2009<br/>Publisher Taylor & Francis,<br/>Publication Date 2009<br/>ISBN 9781439806920<br/>Expert SQL server 2008 encryptionent://SD_ILS/0/SD_ILS:6407182024-05-18T21:19:14Z2024-05-18T21:19:14Zby Coles, Michael, 1972-<br/>Author Coles, Michael, 1972-, Landrum, Rodney<br/>Format: Books<br/>Call Number QA76.9.A25 C653 2009<br/>Publisher Apress,<br/>Publication Date 2009<br/>ISBN 9781430224648 9781430224655<br/>Users' perception of the information security policy at Universiti Teknologi Malaysiaent://SD_ILS/0/SD_ILS:5905812024-05-18T21:19:14Z2024-05-18T21:19:14Zby Haniza Sharif, 1967-<br/>Author Haniza Sharif, 1967-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 018101 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Prototype development of voip steganographyent://SD_ILS/0/SD_ILS:6010982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abdulaleem Zaid Mohammed Al-Othman, 1981-<br/>Author Abdulaleem Zaid Mohammed Al-Othman, 1981-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017146 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>A prototype to evaluate information security awareness level for teacher and student secondary schoolent://SD_ILS/0/SD_ILS:6011132024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nurul Hidayah Ab. Rahman, 1983-<br/>Author Nurul Hidayah Ab. Rahman, 1983-<br/>Format: Computer file<br/>Call Number CP 026663 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Kawalan Maklumat) - Universiti Teknologi Malaysia, 2009<br/>Oracle data guard 11g handbookent://SD_ILS/0/SD_ILS:6249202024-05-18T21:19:14Z2024-05-18T21:19:14Zby Carpenter, Larry<br/>Author Carpenter, Larry<br/>Format: Books<br/>Call Number QA76.9.D348 O73 2009<br/>Publisher Oracle Press/McGraw-Hill,<br/>Publication Date 2009<br/>ISBN 9780071621113<br/>Multimedia forensics and securityent://SD_ILS/0/SD_ILS:2828552024-05-18T21:19:14Z2024-05-18T21:19:14Zby Li, Chang-Tsun<br/>Author Li, Chang-Tsun<br/>Format: Books<br/>Call Number QA76.575 M94 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048697<br/>Hacking exposed 6 : network security secrets and solutionsent://SD_ILS/0/SD_ILS:2874802024-05-18T21:19:14Z2024-05-18T21:19:14Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number QA76.9.A25 M325 2009<br/>Publisher McGraw-Hill,<br/>Publication Date 2009<br/>ISBN 9780071613743<br/>Payment card industry data security standard handbookent://SD_ILS/0/SD_ILS:2875622024-05-18T21:19:14Z2024-05-18T21:19:14Zby Virtue, Timothy M., 1975-<br/>Author Virtue, Timothy M., 1975-<br/>Format: Books<br/>Call Number HG3755.7 V57 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470260463<br/>A prototype to evaluate information security awareness level for teacher and student secondary schoolent://SD_ILS/0/SD_ILS:3718632024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nurul Hidayah Ab. Rahman, 1983-<br/>Author Nurul Hidayah Ab. Rahman, 1983-, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N45 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2828952024-05-18T21:19:14Z2024-05-18T21:19:14Zby Brotby, W. Krag<br/>Author Brotby, W. Krag<br/>Format: Books<br/>Call Number HD30.2 B78 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420052855<br/>Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:3314432024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nemati, Hamid R., 1958-<br/>Author Nemati, Hamid R., 1958-<br/>Format: Books<br/>Call Number HF5548.37 T43 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605662107<br/>Users' perception of the information security policy at Universiti Teknologi Malaysiaent://SD_ILS/0/SD_ILS:3225362024-05-18T21:19:14Z2024-05-18T21:19:14Zby Haniza Sharif, 1967-<br/>Author Haniza Sharif, 1967-, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HF5548.37 H36 2009 raf<br/>Publication Date 2009<br/><a href="http://eprints.utm.my/5291">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:3281292024-05-18T21:19:14Z2024-05-18T21:19:14Zby Collette, Ronald D.<br/>Author Collette, Ronald D., Gentile, Michael, Gentile, Skye<br/>Format: Books<br/>Call Number HF5548.37 C64 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420089103<br/>Multimedia content encryption : techniques and applicationsent://SD_ILS/0/SD_ILS:3281822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Lian, Shiguo<br/>Author Lian, Shiguo<br/>Format: Books<br/>Call Number QA76.575 L52 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420065275<br/>Steganografi menggunakan imej (menggunakan kaedah LSB)ent://SD_ILS/0/SD_ILS:3553642024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Noraishah Abdull Rahman<br/>Author Siti Noraishah Abdull Rahman, Ghazali Sulong, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 S664 2008 raf<br/>Publication Date 2008<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2008<br/>Steganografi menggunakan imej (menggunakan kaedah LSB)ent://SD_ILS/0/SD_ILS:5966822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Noraishah Abdull Rahman<br/>Author Siti Noraishah Abdull Rahman<br/>Format: Computer file<br/>Call Number CP 025941 ra<br/>Publication Date 2008<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2008<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-05-18T21:19:14Z2024-05-18T21:19:14Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Mastering system center data protection manager 2007ent://SD_ILS/0/SD_ILS:2866192024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ganger, Devin L.<br/>Author Ganger, Devin L., Femling, Ryan, 1975-<br/>Format: Books<br/>Call Number QA76.9.A25 G36 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470181522<br/>Privacy-preserving data mining : models and algorithmsent://SD_ILS/0/SD_ILS:2924092024-05-18T21:19:14Z2024-05-18T21:19:14Zby Aggarwal, Charu C.<br/>Author Aggarwal, Charu C., Yu, Philip S.<br/>Format: Books<br/>Call Number QA76.9.D343 P74 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387709918<br/>Netcat power toolsent://SD_ILS/0/SD_ILS:2629492024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kanclirz, Jan<br/>Author Kanclirz, Jan, Baskin, Brian<br/>Format: Books<br/>Call Number TK5105.59 N33 2008<br/>Publisher Syngress Publishing,<br/>Publication Date 2008<br/>ISBN 9781597492577<br/>Computational intelligence in information assurance and securityent://SD_ILS/0/SD_ILS:1967122024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nedjah, Nadia<br/>Author Nedjah, Nadia, Abraham, Ajith, 1968-, Mourelle, Luiza de Macedo<br/>Format: Books<br/>Call Number Q342 C657 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/>Simple computer security : disinfect your PCent://SD_ILS/0/SD_ILS:1709522024-05-18T21:19:14Z2024-05-18T21:19:14Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Books<br/>Call Number QA76.9.A25 G44 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>ISBN 9780470068540<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:1034172024-05-18T21:19:14Z2024-05-18T21:19:14Zby Schou, Corey<br/>Author Schou, Corey, Shoemaker, Dan<br/>Format: Books<br/>Call Number QA76.9.A25 S365 2007<br/>Publisher McGraw-Hill/Irwin,<br/>Publication Date 2007<br/>ISBN 9780072255249<br/>Digital data integrity : the evolution from passive protection to active managementent://SD_ILS/0/SD_ILS:1640052024-05-18T21:19:14Z2024-05-18T21:19:14Zby Little, David B.<br/>Author Little, David B., Farmer, Skip, El-Hilali, Oussama<br/>Format: Books<br/>Call Number QA76.9.A25 L57 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470018279<br/>Conceptualising and developing information security awareness and training programme. Case study : Malaysian financial sectorent://SD_ILS/0/SD_ILS:1495662024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norashikin Shariff<br/>Author Norashikin Shariff<br/>Format: Books<br/>Call Number QA76.9.A25 N679 2007 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Cryptology unlockedent://SD_ILS/0/SD_ILS:2452842024-05-18T21:19:14Z2024-05-18T21:19:14Zby Wobst, Reinhard<br/>Author Wobst, Reinhard<br/>Format: Books<br/>Call Number QA76.9.A25 W62 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470060643<br/>Sistem digital serakan spektrum jujukan terus (dsss) dengan menggunakan altera maxplus IIent://SD_ILS/0/SD_ILS:7711932024-05-18T21:19:14Z2024-05-18T21:19:14Zby Rozeha A. Rashid<br/>Author Rozeha A. Rashid, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number HF5548.37 R69 2007 af<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>ISBN 9789673537372<br/>K9 web protectionent://SD_ILS/0/SD_ILS:5799382024-05-18T21:19:14Z2024-05-18T21:19:14Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Computer file<br/>Call Number CP 11500<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:3011122024-05-18T21:19:14Z2024-05-18T21:19:14Zby Khadraoui, Djamel<br/>Author Khadraoui, Djamel, Herrmann, Francine<br/>Format: Books<br/>Call Number HF5548.37 A38 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:1021872024-05-18T21:19:14Z2024-05-18T21:19:14Zby Layton, Timothy P.<br/>Author Layton, Timothy P.<br/>Format: Books<br/>Call Number HF5548.37 L39 2007<br/>Publisher Auerbach Pub.,<br/>Publication Date 2007<br/>ISBN 9780849370878<br/>Cybersecurity for SCADA systemsent://SD_ILS/0/SD_ILS:1950262024-05-18T21:19:14Z2024-05-18T21:19:14Zby Shaw, William T.<br/>Author Shaw, William T.<br/>Format: Books<br/>Call Number TJ222 S52 2006<br/>Publisher PennWell Corporation,<br/>Publication Date 2006<br/>ISBN 9781593700683<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:1079012024-05-18T21:19:14Z2024-05-18T21:19:14Zby Yee, George<br/>Author Yee, George<br/>Format: Books<br/>Call Number HF5548.37 P74 2006<br/>Publisher Idea Group Publishing,<br/>Publication Date 2006<br/>ISBN 9781591409144<br/>Data protection using advanced encryption standard (AES)ent://SD_ILS/0/SD_ILS:1099172024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Dhalia Adzim Muhamod Adzim<br/>Author Siti Dhalia Adzim Muhamod Adzim<br/>Format: Books<br/>Call Number QA76.9.A25 S34 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Telekomunikasi)) - Universiti Teknologi Malaysia, 2006<br/>The Ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:1566492024-05-18T21:19:14Z2024-05-18T21:19:14Zby Gentile, Mike<br/>Author Gentile, Mike, Collette, Ronald D., August, Thomas D.<br/>Format: Books<br/>Call Number HF5548.37 G46 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849319525<br/>Securing SCADA systemsent://SD_ILS/0/SD_ILS:1121462024-05-18T21:19:14Z2024-05-18T21:19:14Zby Krutz, Ronald L., 1938-<br/>Author Krutz, Ronald L., 1938-<br/>Format: Books<br/>Call Number TS156.8 K78 2006<br/>Publisher Wiley Publishing,<br/>Publication Date 2006<br/>ISBN 9780764597879<br/>Sistem penyembunyian pelbagai format data menggunakan teknik steganografient://SD_ILS/0/SD_ILS:1146722024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Heikal Othman<br/>Author Muhammad Heikal Othman, Md. Asri Ngadi, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M445 2006 raf<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Penyembunyian mesej ke dalam fail audio MP3 melalui teknik steganograpient://SD_ILS/0/SD_ILS:1191932024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Faisal Nasron<br/>Author Mohd. Faisal Nasron, Hazinah Kutty Mammi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M434 2006 raf<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Developing information security policy : case study of Biruni Remote Sensing Center (BRSC)ent://SD_ILS/0/SD_ILS:1316702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohamed. K. Bayoud<br/>Author Mohamed. K. Bayoud<br/>Format: Books<br/>Call Number QA76.9.A25 M525 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/>Towards a more managable and secure desktop systemsent://SD_ILS/0/SD_ILS:1316882024-05-18T21:19:14Z2024-05-18T21:19:14Zby Shaharin Sulaiman<br/>Author Shaharin Sulaiman<br/>Format: Books<br/>Call Number QA76.9.A25 S526 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Sistem penyembunyian pelbagai format data menggunakan teknik steganografient://SD_ILS/0/SD_ILS:5631512024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Heikal Othman<br/>Author Muhammad Heikal Othman<br/>Format: Computer file<br/>Call Number CP 025886 ra<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Information technology securityent://SD_ILS/0/SD_ILS:4900442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Rahayu Selamat<br/>Author Siti Rahayu Selamat<br/>Format: Books<br/>Call Number QA76.9 A25 I53 2006<br/>Publisher Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9789833655472<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:4240282024-05-18T21:19:14Z2024-05-18T21:19:14Zby Landoll, Douglas J.<br/>Author Landoll, Douglas J.<br/>Format: Books<br/>Call Number HE5548.37 L36 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849329982<br/>Hacking exposed cisco networks : cisco security secrets and solutionsent://SD_ILS/0/SD_ILS:4666782024-05-18T21:19:14Z2024-05-18T21:19:14Zby Vladimirov, Andrew A.<br/>Author Vladimirov, Andrew A.<br/>Format: Books<br/>Call Number TK5105.59 H324 2006<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2006<br/>ISBN 9780072259179<br/>Information technology security & risk managementent://SD_ILS/0/SD_ILS:4671512024-05-18T21:19:14Z2024-05-18T21:19:14Zby Slay, Jill<br/>Author Slay, Jill, Koronios, Andy<br/>Format: Books<br/>Call Number QA76.9.A25 S54 2006<br/>Publisher John Wiley & Sons Australia,<br/>Publication Date 2006<br/>ISBN 9780470805749<br/>Information security risk assessment at JHEV-ATM develop and implementation of risk assessment methodent://SD_ILS/0/SD_ILS:4768772024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nik Zalbiha Nik Mat<br/>Author Nik Zalbiha Nik Mat<br/>Format: Books<br/>Call Number HF5548.37 N92 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Privacy preserving data miningent://SD_ILS/0/SD_ILS:2716292024-05-18T21:19:14Z2024-05-18T21:19:14Zby Vaidya, Jaideep<br/>Author Vaidya, Jaideep, Clifton, Christopher Wade, Zhu, Michael<br/>Format: Books<br/>Call Number QA76.9.D343 V35 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387258867<br/>Data security and privacy law : combating cyberthreatsent://SD_ILS/0/SD_ILS:1342162024-05-18T21:19:14Z2024-05-18T21:19:14Zby Cronin, Kevin P.<br/>Author Cronin, Kevin P., Weikers, Ronald N.<br/>Format: Books<br/>Call Number KF1263.C65 C76 2006<br/>Publisher Thomson/West,<br/>Publication Date 2006<br/>Digital preservationent://SD_ILS/0/SD_ILS:944072024-05-18T21:19:14Z2024-05-18T21:19:14Zby Deegan, Marilyn<br/>Author Deegan, Marilyn, Tanner, Simon<br/>Format: Books<br/>Call Number ZA4080 D534 2006<br/>Publisher Facet Publishing,<br/>Publication Date 2006<br/>ISBN 9781856044851<br/>Information assurance : security in the information environmentent://SD_ILS/0/SD_ILS:945472024-05-18T21:19:14Z2024-05-18T21:19:14Zby Blyth, Andrew, 1966-<br/>Author Blyth, Andrew, 1966-, Kovacich, Gerald L.<br/>Format: Books<br/>Call Number QA76.9.A25 B59 2006<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846282669<br/>IT governance : a managers guide to data security and BS 7799/ISO 17799ent://SD_ILS/0/SD_ILS:1269642024-05-18T21:19:14Z2024-05-18T21:19:14Zby Calder, Alan, 1957-<br/>Author Calder, Alan, 1957-, Watkins, Steve, 1970-<br/>Format: Books<br/>Call Number QA76.9.A25 C346 2005<br/>Edition 3rd ed.<br/>Publisher Kogan Page,<br/>Publication Date 2005<br/>ISBN 9780749446505<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:1566642024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kairab, Sudhanshu<br/>Author Kairab, Sudhanshu<br/>Format: Books<br/>Call Number HF5548.32 K344 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849317064<br/>Spatial domain technique to embed visible and invisible wetermarkingent://SD_ILS/0/SD_ILS:4116652024-05-18T21:19:14Z2024-05-18T21:19:14Zby Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Sayuthi Jaafar, International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Assessing and managing security risk in IT systems : a structured methodologyent://SD_ILS/0/SD_ILS:4230802024-05-18T21:19:14Z2024-05-18T21:19:14Zby McCumber, John, 1956-<br/>Author McCumber, John, 1956-<br/>Format: Books<br/>Call Number QA76.9.A25 M324 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005 2004<br/>ISBN 9780849322327<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:4442242024-05-18T21:19:14Z2024-05-18T21:19:14Zby Paquet, Cathrine<br/>Author Paquet, Cathrine, Saxe, Warren<br/>Format: Books<br/>Call Number TK5105.59 P36 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587201219<br/>Comparing image quality of different steganographic techniquesent://SD_ILS/0/SD_ILS:4435122024-05-18T21:19:14Z2024-05-18T21:19:14Zby Azizah Abdul Manaf<br/>Author Azizah Abdul Manaf, Akram Mohd. Zeki, Sayuthi Jaafar, Salehuddin A. Kadir, International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 C655 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:4544162024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ben-Natan, Ron<br/>Author Ben-Natan, Ron<br/>Format: Books<br/>Call Number QA76.9.A25 B46 2005<br/>Publisher Elsevier Digital Press,<br/>Publication Date 2005<br/>ISBN 9781555583347<br/>Personal data and privacy protectionent://SD_ILS/0/SD_ILS:4839942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Abdul Raman Saad<br/>Author Abdul Raman Saad<br/>Format: Books<br/>Call Number K3263 A72 2005<br/>Publisher Malayan Law Journal,<br/>Publication Date 2005<br/>ISBN 9789679626544<br/>Information security policies and procedures : a practitioner's referenceent://SD_ILS/0/SD_ILS:4140452024-05-18T21:19:14Z2024-05-18T21:19:14Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA 76.9.A25P448 2004<br/>Edition 2nd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2005 2004<br/>ISBN 9780849319587<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:4155112024-05-18T21:19:14Z2024-05-18T21:19:14Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R., Peltier, Justin, Blackley, John A.<br/>Format: Books<br/>Call Number QA76.9.A25 P444 2005<br/>Publisher CRC Press,<br/>Publication Date 2005<br/>ISBN 9780849319570<br/>Analysis of image quality for steganographic softwareent://SD_ILS/0/SD_ILS:4547702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Azizah Abd. Manaf, Prof. Dr.<br/>Author Azizah Abd. Manaf, Prof. Dr., M. Z. Akram, K. Salehuddin, Sayuthi Jaafar, Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format: Books<br/>Call Number QA76.9.A25 A53 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. netent://SD_ILS/0/SD_ILS:6054442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Syaiful Adli Mohd<br/>Author Mohd. Syaiful Adli Mohd<br/>Format: Computer file<br/>Call Number CP 013937<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:6079342024-05-18T21:19:14Z2024-05-18T21:19:14Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Computer file<br/>Call Number CP 5816<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. netent://SD_ILS/0/SD_ILS:4078992024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Syaiful Adli Mohd<br/>Author Mohd. Syaiful Adli Mohd<br/>Format: Books<br/>Call Number QA76.9.A25 M79 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:3955292024-05-18T21:19:14Z2024-05-18T21:19:14Zby Young, Adam, 1972-<br/>Author Young, Adam, 1972-, Yung, Moti<br/>Format: Books<br/>Call Number QA 76.9 .A25 Y68 2004<br/>Publisher Wiley Pub.,<br/>Publication Date 2004<br/>ISBN 9780764549755<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:3961822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Slade, Robert M.<br/>Author Slade, Robert M.<br/>Format: Books<br/>Call Number QA76.9.A25 S524 2004<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780071428040<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:4041252024-05-18T21:19:14Z2024-05-18T21:19:14Zby Koziol, Jack<br/>Author Koziol, Jack<br/>Format: Books<br/>Call Number QA 76.9.A25 S534 2004<br/>Publisher Wiley Pubs,<br/>Publication Date 2004<br/>ISBN 9780764544682<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:4201472024-05-18T21:19:14Z2024-05-18T21:19:14Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 C344 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:4203022024-05-18T21:19:14Z2024-05-18T21:19:14Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C345 2004<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580538305<br/>Digital defence what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:2266372024-05-18T21:19:14Z2024-05-18T21:19:14Zby Parenty, Thomas J.<br/>Author Parenty, Thomas J.<br/>Format: Books<br/>Call Number HD30.38 P37<br/>Publisher Harvard Business School Press,<br/>Publication Date 2003<br/>ISBN 9781578517794<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-05-18T21:19:14Z2024-05-18T21:19:14Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC)ent://SD_ILS/0/SD_ILS:3621282024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kamal Azizi Mohd. Yasin<br/>Author Kamal Azizi Mohd. Yasin<br/>Format: Books<br/>Call Number QA76.9.A25 K35 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:3623822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Books<br/>Call Number QA76.9.A25 N674 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Twofish-based file encryptionent://SD_ILS/0/SD_ILS:3791142024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Hatta Kassim<br/>Author Muhammad Hatta Kassim<br/>Format: Books<br/>Call Number QA76.9.A25 M52 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/>Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC)ent://SD_ILS/0/SD_ILS:5980132024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kamal Azizi Mohd. Yasin<br/>Author Kamal Azizi Mohd. Yasin<br/>Format: Computer file<br/>Call Number CP 5533<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:5999532024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Computer file<br/>Call Number CP 5544<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Twofish-based file encryptionent://SD_ILS/0/SD_ILS:6019932024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Hatta Kassim<br/>Author Muhammad Hatta Kassim<br/>Format: Computer file<br/>Call Number CP 6561<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2003<br/>Hacking exposed : network security secrets and solutionsent://SD_ILS/0/SD_ILS:6033422024-05-18T21:19:14Z2024-05-18T21:19:14Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Computer file<br/>Call Number CP 4128<br/>Edition 4th ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>Surviving security : how to integrate people, process, and technologyent://SD_ILS/0/SD_ILS:4141162024-05-18T21:19:14Z2024-05-18T21:19:14Zby Andress, Amanda<br/>Author Andress, Amanda<br/>Format: Books<br/>Call Number QA 76.9 .A25 A 52 2003<br/>Edition 2nd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2003<br/>ISBN 9780849320422<br/>Hacking exposed : network security secrets & solutionsent://SD_ILS/0/SD_ILS:3473952024-05-18T21:19:14Z2024-05-18T21:19:14Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M48 2003<br/>Edition 4th ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072227420<br/>Security in computingent://SD_ILS/0/SD_ILS:3401732024-05-18T21:19:14Z2024-05-18T21:19:14Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P., Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P44 2003<br/>Edition 3rd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2003<br/>ISBN 9780130355485 9780131201996<br/>Prototaip pengesahan dan penyahkodan watermarking dalam imej digitalent://SD_ILS/0/SD_ILS:3412942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Lee, Chin Keong<br/>Author Lee, Chin Keong<br/>Format: Books<br/>Call Number QA76.9.A25 L43 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Network security for dummiesent://SD_ILS/0/SD_ILS:3259402024-05-18T21:19:14Z2024-05-18T21:19:14Zby Cobb, Chey<br/>Author Cobb, Chey<br/>Format: Books<br/>Call Number TK5105 C63 2003<br/>Publisher Wiley Publishing,<br/>Publication Date 2003<br/>ISBN 9780764516795<br/>Computer and intrusion forensicsent://SD_ILS/0/SD_ILS:3415452024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohay, George M., 1945-<br/>Author Mohay, George M., 1945-<br/>Format: Books<br/>Call Number QA76.9.A25 C633 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533690<br/>Data protection strategy : implementing data protection complianceent://SD_ILS/0/SD_ILS:2614192024-05-18T21:19:14Z2024-05-18T21:19:14Zby Morgan, Richard<br/>Author Morgan, Richard, Boardman, Ruth<br/>Format: Books<br/>Call Number HF5548.37 M67 2003<br/>Publisher Thomson Sweet & Maxwell,<br/>Publication Date 2003<br/>ISBN 9780421838307<br/>Sistem diagnosis penyakit kulit menggunakan pendekatan berasaskan peraturanent://SD_ILS/0/SD_ILS:82842024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kuang, Yee Ling<br/>Author Kuang, Yee Ling<br/>Format: Visual Materials<br/>Call Number MFL 12984<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:1679792024-05-18T21:19:14Z2024-05-18T21:19:14Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P447 2002<br/>Publisher Auerbach Publications,<br/>Publication Date 2002<br/>ISBN 9780849311376<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Key recovery in public key insfrastructureent://SD_ILS/0/SD_ILS:3604842024-05-18T21:19:14Z2024-05-18T21:19:14Zby Teoh, Su Chi<br/>Author Teoh, Su Chi<br/>Format: Books<br/>Call Number QA76.9.A.25 T464 2002 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2002<br/>Safe and secure : secure your home network and protect your privacy onlineent://SD_ILS/0/SD_ILS:3837822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Danesh, Arman<br/>Author Danesh, Arman, Lau, Felix, Mehrassa, Ali<br/>Format: Books<br/>Call Number QA76.9.A25 D36 2002<br/>Publisher Sams,<br/>Publication Date 2002<br/>ISBN 9780672322433<br/>Information assurance : managing organizational IT security risksent://SD_ILS/0/SD_ILS:7568342024-05-18T21:19:14Z2024-05-18T21:19:14Zby Boyce, Joseph George, 1951-<br/>Author Boyce, Joseph George, 1951-, Jennings, Dan Wesley, 1954-<br/>Format: Books<br/>Call Number QA76.9.A25 B69 2002<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2002<br/>ISBN 9780750673273<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:5963682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Jones, Keith J.<br/>Author Jones, Keith J., Shema, Mike, Johnson, Bradley C.<br/>Format: Computer file<br/>Call Number CP 2453<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:4240292024-05-18T21:19:14Z2024-05-18T21:19:14Zby Herrmann, Debra S.<br/>Author Herrmann, Debra S.<br/>Format: Books<br/>Call Number QA76.9.A25 H474 2002<br/>Publisher CRC Press,<br/>Publication Date 2002 2001<br/>ISBN 9780849311635<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-05-18T21:19:14Z2024-05-18T21:19:14Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Anti-hacker tool kitent://SD_ILS/0/SD_ILS:3455332024-05-18T21:19:14Z2024-05-18T21:19:14Zby Jones, Keith J.<br/>Author Jones, Keith J., Shema, Mike, Johnson, Bradley C.<br/>Format: Books<br/>Call Number TK5105.59 J66 2002<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2002<br/>ISBN 9780072222821<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-05-18T21:19:14Z2024-05-18T21:19:14Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>An electronic commerce model utilizing data security technique = Satu model perdagangan elektronik menggunakan teknik keselamatan dataent://SD_ILS/0/SD_ILS:3490142024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ab. Razak Che Hussin<br/>Author Ab. Razak Che Hussin, Mahadi Bahari, Halina Mohamed Dahlan, Rashidah Kadir<br/>Format: Books<br/>Call Number HF5548.32 E437 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Aplikasi WAP : pencapaian keputusan semester pelajar dengan integrasi perkhidmatan keselamatan melalui implementasi sistem kripto lengkungan eliptikent://SD_ILS/0/SD_ILS:3085452024-05-18T21:19:14Z2024-05-18T21:19:14Zby Woo, Wei Leng<br/>Author Woo, Wei Leng<br/>Format: Books<br/>Call Number TK5105.5865 W66 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem pemulihan kekunci dalam infrastruktur kekunci umum bagi teleperubatanent://SD_ILS/0/SD_ILS:3085482024-05-18T21:19:14Z2024-05-18T21:19:14Zby Tan, Kieng Wei<br/>Author Tan, Kieng Wei<br/>Format: Books<br/>Call Number QA76.9.A25 T37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem perkhidmatan Penguasa Sijil (CA) dan Penguasa Pendaftaran (RA) bagi implementasi Infrastruktur Kekunci Umum (PKI) dalam teleperubatanent://SD_ILS/0/SD_ILS:3096402024-05-18T21:19:14Z2024-05-18T21:19:14Zby Son, Yeo Yiin<br/>Author Son, Yeo Yiin<br/>Format: Books<br/>Call Number QA76.9.A25 S66 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Building an information security awareness programent://SD_ILS/0/SD_ILS:3133202024-05-18T21:19:14Z2024-05-18T21:19:14Zby Desman, Mark B<br/>Author Desman, Mark B<br/>Format: Books<br/>Call Number QA76.9.A25 D47 2002<br/>Publisher Auerbach Publications,<br/>Publication Date 2002<br/>ISBN 9780849301162<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-05-18T21:19:14Z2024-05-18T21:19:14Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection of DoS attacks using intrusion detection sensorsent://SD_ILS/0/SD_ILS:3220342024-05-18T21:19:14Z2024-05-18T21:19:14Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format: Books<br/>Call Number TK5105.59 P37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-05-18T21:19:14Z2024-05-18T21:19:14Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-05-18T21:19:14Z2024-05-18T21:19:14Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem penganalisa paket rangkaian ethernetent://SD_ILS/0/SD_ILS:72752024-05-18T21:19:14Z2024-05-18T21:19:14Zby Heng, Choon Tai<br/>Author Heng, Choon Tai<br/>Format: Visual Materials<br/>Call Number MFL 12589<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Pembelajaran matematik tingkatan satu : topik mempermudahkan hasil tambah dan hasil tolak integer positif dan negatif secara berkomputerent://SD_ILS/0/SD_ILS:73072024-05-18T21:19:14Z2024-05-18T21:19:14Zby Aidah Misran<br/>Author Aidah Misran<br/>Format: Visual Materials<br/>Call Number MFL 12219<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Removal of organics, nitrogen and phosphorus using membrane bioreactorent://SD_ILS/0/SD_ILS:80972024-05-18T21:19:14Z2024-05-18T21:19:14Zby Khor, Swee Loong<br/>Author Khor, Swee Loong<br/>Format: Visual Materials<br/>Call Number MFL 13001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Kejuruteraan (Alam Sekitar)) - Universiti Teknologi Malaysia, 2002<br/>Sistem pembangunan multimedia (Mindspark contentcreation studio)ent://SD_ILS/0/SD_ILS:192892024-05-18T21:19:14Z2024-05-18T21:19:14Zby Lim, Shiau Kean<br/>Author Lim, Shiau Kean<br/>Format: Visual Materials<br/>Call Number MFL 11567<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamirent://SD_ILS/0/SD_ILS:210752024-05-18T21:19:14Z2024-05-18T21:19:14Zby Azhar Ali<br/>Author Azhar Ali<br/>Format: Visual Materials<br/>Call Number MFL 12075<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem maklumat pengurusan dan penerapan konsep pembelajaran secara elektronik bagi Akademi Pendidikan Pemandu (M) Sdn. Bhd.ent://SD_ILS/0/SD_ILS:212882024-05-18T21:19:14Z2024-05-18T21:19:14Zby Asmahani Kadir<br/>Author Asmahani Kadir<br/>Format: Visual Materials<br/>Call Number MFL 11961<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem kaunseling bercirikan keselamatan untuk sekolah bestari : kriptografi lengkungan eliptikent://SD_ILS/0/SD_ILS:1686952024-05-18T21:19:14Z2024-05-18T21:19:14Zby Herny Ramadhani Mohd Husny Hamid<br/>Author Herny Ramadhani Mohd Husny Hamid<br/>Format: Books<br/>Call Number QA76.9 A25 H46 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem keselamatan komunikasi data berkomputer antara PDRM Cawangan Johor Bahru berkonsepkan pelayan pelangganent://SD_ILS/0/SD_ILS:1693582024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Hafeez Osman<br/>Author Mohd. Hafeez Osman<br/>Format: Books<br/>Call Number TK5105 M52 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem kaunseling bercirikan keselamatan untuk sekolah bistari : pengesahan identiti penggunaent://SD_ILS/0/SD_ILS:1697662024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nor Azlan Muhamed Sulong<br/>Author Nor Azlan Muhamed Sulong<br/>Format: Books<br/>Call Number QA76.9.A25 N673 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem keselamatan komunikasi data berkomputerent://SD_ILS/0/SD_ILS:1612992024-05-18T21:19:14Z2024-05-18T21:19:14Zby Shahril Ameir Ani<br/>Author Shahril Ameir Ani<br/>Format: Books<br/>Call Number TK5105 S52 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Kejuteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2001<br/>E-learning : pakej pembelajaran asas grafik berkomputer secara online - bab atribut primitif outputent://SD_ILS/0/SD_ILS:6109982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Hafiz Haron<br/>Author Mohd. Hafiz Haron<br/>Format: Computer file<br/>Call Number MFL 11962<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Enkripsi blok pelbagai saiz menggunakan pencampur blok seimbangent://SD_ILS/0/SD_ILS:2970812024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Zura A. Jalil @ Zainuddin<br/>Author Siti Zura A. Jalil @ Zainuddin<br/>Format: Books<br/>Call Number QA76.9.A25 S98 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Thesis (Sarjana Kejuruteraan Elektrik ) - Universiti Teknologi Malaysia, 2001<br/>Making it personal : how to profit from personalization without invading privacyent://SD_ILS/0/SD_ILS:3721802024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kasanoff, Bruce<br/>Author Kasanoff, Bruce<br/>Format: Books<br/>Call Number HF5415.55 K37 2001<br/>Publisher John Wiley,<br/>Publication Date 2001<br/>ISBN 9780470843963<br/>Computer forensics and privacyent://SD_ILS/0/SD_ILS:3341822024-05-18T21:19:14Z2024-05-18T21:19:14Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C34 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532839<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.]ent://SD_ILS/0/SD_ILS:138512024-05-18T21:19:14Z2024-05-18T21:19:14Zby Chua, Soo Yaw<br/>Author Chua, Soo Yaw, Mohd. Suhaizal Md. Kamari, Mona Effarina Zakaria, Nik Raihan Nik Omar, Wan Nur Ilyana Wan Zahari<br/>Format: Visual Materials<br/>Call Number MFL 10606<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Keselamatan penghantaran maklumat yang fleksibelent://SD_ILS/0/SD_ILS:173092024-05-18T21:19:14Z2024-05-18T21:19:14Zby Salbiah Mohd. Nor<br/>Author Salbiah Mohd. Nor<br/>Format: Visual Materials<br/>Call Number MFL 12125<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Confidential<br/>Aplikasi sistem keselamatan komunikasi Angkatan Tentera Malaysiaent://SD_ILS/0/SD_ILS:210902024-05-18T21:19:14Z2024-05-18T21:19:14Zby Azwan Abdul Aziz<br/>Author Azwan Abdul Aziz<br/>Format: Visual Materials<br/>Call Number MFL 12123<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi /ATMA, 2000<br/>Aplikasi sistem keselamatan komunikasi Angkatan Tentera Malaysiaent://SD_ILS/0/SD_ILS:1586102024-05-18T21:19:14Z2024-05-18T21:19:14Zby Azwan Abdul Aziz<br/>Author Azwan Abdul Aziz<br/>Format: Books<br/>Call Number TK5105 A98 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi /ATMA, 2000<br/>Security and surveillance automation in an industrial plantent://SD_ILS/0/SD_ILS:1659872024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohamed Najib Ribuan<br/>Author Mohamed Najib Ribuan<br/>Format: Books<br/>Call Number QA76.9.A25 M62 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Sistem capaian data dalam depoh bantuan TLDMent://SD_ILS/0/SD_ILS:1586662024-05-18T21:19:14Z2024-05-18T21:19:14Zby Khairul Kamarul Ariffin<br/>Author Khairul Kamarul Ariffin<br/>Format: Books<br/>Call Number QA76.9.A25 K52 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Keselamatan penghantaran maklumat yang fleksibelent://SD_ILS/0/SD_ILS:1589322024-05-18T21:19:14Z2024-05-18T21:19:14Zby Salbiah Mohd. Nor<br/>Author Salbiah Mohd. Nor<br/>Format: Books<br/>Call Number Z103 S24 2000 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Sulit<br/>A traceable proactive anonymous electronic cashent://SD_ILS/0/SD_ILS:1395382024-05-18T21:19:14Z2024-05-18T21:19:14Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Security and surveillance automation for a government buildingent://SD_ILS/0/SD_ILS:1476712024-05-18T21:19:14Z2024-05-18T21:19:14Zby Yamini Sivashankari S. Sivashunmugam<br/>Author Yamini Sivashankari S. Sivashunmugam<br/>Format: Books<br/>Call Number QA76.9.A25 Y35 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografient://SD_ILS/0/SD_ILS:1480352024-05-18T21:19:14Z2024-05-18T21:19:14Zby Chua, Tee Khoon @ Chua Yong Peng<br/>Author Chua, Tee Khoon @ Chua Yong Peng<br/>Format: Books<br/>Call Number QA76.9.A25 C58 2000 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Risk analysis guideline for IT environmentent://SD_ILS/0/SD_ILS:1232572024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mazleena Salleh<br/>Author Mazleena Salleh, Rabiah Ahmad, Dr., Norafida Ithnin, Subariah Ibrahim, Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R57 2000<br/>Publication Date 2000<br/>Security control and analysis systement://SD_ILS/0/SD_ILS:4816102024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norbik Bashah Idris<br/>Author Norbik Bashah Idris, Subariah Ibrahim, Mazleena Salleh, Nik Khairul Raja Abdullah<br/>Format: Books<br/>Call Number MAK 12825 a<br/>Publication Date 2000<br/>Kriptografi untuk unit pengurusan operasi TLDMent://SD_ILS/0/SD_ILS:202502024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ayuwati Suraya Abu Bakar<br/>Author Ayuwati Suraya Abu Bakar<br/>Format: Visual Materials<br/>Call Number MFL 12095<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Sistem pemulihan kunci dengan kaedah medan pemulihan kuncient://SD_ILS/0/SD_ILS:1006182024-05-18T21:19:14Z2024-05-18T21:19:14Zby Phua, Ooi Ewe<br/>Author Phua, Ooi Ewe<br/>Format: Books<br/>Call Number QA76.9.A25 P48 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Membangunkan alatan yang membenarkan perkongsian fail di antara Linux dan Windows NT ... [et al.]ent://SD_ILS/0/SD_ILS:130522024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norhamin Amit<br/>Author Norhamin Amit, Syukrie Mohd. Nasir, Wan Saari Wan Alias, Yuhasliza Mohd. Yusoh, Yusmariani Mohd. Yusoff<br/>Format: Visual Materials<br/>Call Number MFL 9508<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Pembangunan pakej kelas maya : kerja dan tenaga KBSM ... [et al.]ent://SD_ILS/0/SD_ILS:133182024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norhaniza Mohamat Sharif<br/>Author Norhaniza Mohamat Sharif, Nurul Asikin Ahmad Khairudin, Phua, Ooi Ewe, Tun Abd. Karim Tun Abu Bakar, Rooslaili Kamis<br/>Format: Visual Materials<br/>Call Number MFL 9424<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Kajian keselamatan data berbantukan agen mobileent://SD_ILS/0/SD_ILS:1013552024-05-18T21:19:14Z2024-05-18T21:19:14Zby Yuhasliza Mohd. Yusoh<br/>Author Yuhasliza Mohd. Yusoh<br/>Format: Books<br/>Call Number QA76.9.A25 Y83 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Pembangunan sistem pemulihan kunci menggunakan kaedah pengescrowanent://SD_ILS/0/SD_ILS:4697542024-05-18T21:19:14Z2024-05-18T21:19:14Zby Liew, Chee Wah<br/>Author Liew, Chee Wah<br/>Format: Books<br/>Call Number QA76.9.A25 L53 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1998<br/>Penyulitan dan penyahsulitan direktori dalam persekitaran windows 95ent://SD_ILS/0/SD_ILS:4699862024-05-18T21:19:14Z2024-05-18T21:19:14Zby Ong, Yean Hoon<br/>Author Ong, Yean Hoon<br/>Format: Books<br/>Call Number QA76.9.A25 O52 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysai, 1998<br/>Client / server untuk sistem maklumat sekolah bersepadu menggunakan SQL ... [et al.]ent://SD_ILS/0/SD_ILS:78742024-05-18T21:19:14Z2024-05-18T21:19:14Zby Chandraseegar Krishnan<br/>Author Chandraseegar Krishnan, Liew, Chee Wah, Ong, Yean Hoon, Wan Raina Wan Yusoff, Yusniza Yusoff<br/>Format: Visual Materials<br/>Call Number MFL 9154 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Security in computingent://SD_ILS/0/SD_ILS:4575992024-05-18T21:19:14Z2024-05-18T21:19:14Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1996<br/>Edition 2nd ed.<br/>Publisher Prentice-Hall,<br/>Publication Date 1997<br/>ISBN 9780131857940 9780133374865<br/>Protecting business information : a manager's guideent://SD_ILS/0/SD_ILS:4674702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number HD38.7 S34 1996<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696586<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-05-18T21:19:14Z2024-05-18T21:19:14Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Protection and security on the information superhighwayent://SD_ILS/0/SD_ILS:3826622024-05-18T21:19:14Z2024-05-18T21:19:14Zby Cohen, Frederick B.<br/>Author Cohen, Frederick B.<br/>Format: Books<br/>Call Number QA76.9.A25 C63 1995<br/>Publisher John Wiley & Sons,<br/>Publication Date 1995<br/>ISBN 9780471113898<br/>Kriptologient://SD_ILS/0/SD_ILS:3362182024-05-18T21:19:14Z2024-05-18T21:19:14Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number QA76.9.A25 B66 1994 raf<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Kriptologient://SD_ILS/0/SD_ILS:3362202024-05-18T21:19:14Z2024-05-18T21:19:14Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number DSK 616 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Commonsense computer security : your practical guide to information protectionent://SD_ILS/0/SD_ILS:3511832024-05-18T21:19:14Z2024-05-18T21:19:14Zby Smith, Martin<br/>Author Smith, Martin<br/>Format: Books<br/>Call Number QA76.9.A25 S64 1993<br/>Edition 2nd ed<br/>Publisher McGraw-Hill,<br/>Publication Date 1993<br/>ISBN 9780077078058<br/>EDP-securityent://SD_ILS/0/SD_ILS:1715102024-05-18T21:19:14Z2024-05-18T21:19:14Zby Frank, Lars<br/>Author Frank, Lars<br/>Format: Books<br/>Call Number QA76 F73 1992<br/>Publisher Elsevier Science,<br/>Publication Date 1992<br/>ISBN 9780444886088<br/>Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:1876592024-05-18T21:19:14Z2024-05-18T21:19:14Zby Voo, Fui Ken<br/>Author Voo, Fui Ken<br/>Format: Books<br/>Call Number TK5105.5.V66 1992 raf<br/>Publication Date 1992<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1992<br/>The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:2712022024-05-18T21:19:14Z2024-05-18T21:19:14Zby Fauziah Hanim Omar<br/>Author Fauziah Hanim Omar, Jasmi Mohd Daron, Jayaseelan Manickam, Mohd. Zaki Yahaya, Ooi, Foong Yen<br/>Format: Books<br/>Call Number MFL 7750 ra<br/>Publisher UTM,<br/>Publication Date 1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>Security in computingent://SD_ILS/0/SD_ILS:2364252024-05-18T21:19:14Z2024-05-18T21:19:14Zby Peleeger, Charles P.<br/>Author Peleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1989<br/>Publisher Prentice-Hall,<br/>Publication Date 1989<br/>ISBN 9780137989430<br/>Introduction to cryptologyent://SD_ILS/0/SD_ILS:1732122024-05-18T21:19:14Z2024-05-18T21:19:14Zby Beckett, Brian<br/>Author Beckett, Brian<br/>Format: Books<br/>Call Number QA76.9.A25 B42 1988<br/>Publisher Blackwell Scientific Pub.,<br/>Publication Date 1988<br/>ISBN 9780632022434<br/>Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teksent://SD_ILS/0/SD_ILS:1667702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Siti Nurliza Mokhtar<br/>Author Siti Nurliza Mokhtar, Hendri Dwisatrya Sabir Husin Athar, Mohd. Nasir A. Rahman, Zaleha @ Siti Zaleha Yusof, Zalila Sumari<br/>Format: Books<br/>Call Number MFL 3864-3869 ra<br/>Publication Date 1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkripent://SD_ILS/0/SD_ILS:4327612024-05-18T21:19:14Z2024-05-18T21:19:14Zby Salina Salam<br/>Author Salina Salam<br/>Format: Books<br/>Call Number QA76.9.D37 S34 1988 raf<br/>Publisher UTM,<br/>Publication Date 1988<br/>Tesis (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umument://SD_ILS/0/SD_ILS:4370742024-05-18T21:19:14Z2024-05-18T21:19:14Zby Fauziah Abu Mansor<br/>Author Fauziah Abu Mansor<br/>Format: Books<br/>Call Number Z104.F48 1988 raf<br/>Publisher UTM,<br/>Publication Date 1988<br/>Tesis (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1988<br/>Database securityent://SD_ILS/0/SD_ILS:3668942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number MAK 14902<br/>Publication Date 1988<br/>Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum; Sistem kawalan pemacuan motor aruhan lelurus; Optimal control design in frequency domain; Versatile auto programmer system; Biomedical telemetry system for freely moving patients; Considerations in technology upgrading; Slow scan TV (SSTV)ent://SD_ILS/0/SD_ILS:88982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Fauziah Abu Mansor @ Mash-hod<br/>Author Fauziah Abu Mansor @ Mash-hod, Nik Din Muhamad, Chean, Kooi Chyi, Chua, Poh Cheng, Nilavarasan Periasamy<br/>Format: Visual Materials<br/>Call Number MFL 3914-3920 ra<br/>Publisher UTM,<br/>Publication Date 1988<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia,1988.<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Cryptography and data securityent://SD_ILS/0/SD_ILS:2960312024-05-18T21:19:14Z2024-05-18T21:19:14Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number QA76.9.A25 D46 1982<br/>Publisher Addison-Wesley,<br/>Publication Date 1983 1982<br/>ISBN 9780201101508<br/>FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8442932024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author Nor Fazlinda Mohd. Puad, 1980-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 N67 2014 raf<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8442942024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author Nor Fazlinda Mohd. Puad, 1980-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034194 ra<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:8358732024-05-18T21:19:14Z2024-05-18T21:19:14Zby Peltier , Thomas R author<br/>Author Peltier , Thomas R author<br/>Format: Books<br/>Call Number QA76.9.A25 P454 2014<br/>Edition Second edition<br/>ISBN 9781439810620<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378782024-05-18T21:19:14Z2024-05-18T21:19:14Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034149 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390932024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034541 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>CONCEPTUAL PRIVACY RISK ASSESSMENT MODEL FOR PERSONAL DATA PROTECTION IN AN INSURANCE SYSTEMent://SD_ILS/0/SD_ILS:8395402024-05-18T21:19:14Z2024-05-18T21:19:14Zby Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author<br/>Author Muhammad Aniq Eastrarulkhair Mohmad Hairin, 1986-, author, Zailani Mohamed Sidek, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 M84 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHMent://SD_ILS/0/SD_ILS:8404592024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 S26 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHMent://SD_ILS/0/SD_ILS:8404602024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034008 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Information leakage of boolean fuctions and its relationship to other cryptographic criteriaent://SD_ILS/0/SD_ILS:4117952024-05-18T21:19:14Z2024-05-18T21:19:14Zby Zhang, M.<br/>Author Zhang, M., Tavares, S. E., Campbell, L. L.<br/>Format: Books<br/>Call Number MAK 5975<br/>TECHNOLOGY ETHICS IN HANDLING CONFIDENTIAL INFORMATION FOR THE ARMED FORCESent://SD_ILS/0/SD_ILS:8594912024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nor Azreen Zakaria, 1986-, author<br/>Author Nor Azreen Zakaria, 1986-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number T58.5 N673 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>TECHNOLOGY ETHICS IN HANDLING CONFIDENTIAL INFORMATION FOR THE ARMED FORCESent://SD_ILS/0/SD_ILS:8594922024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nor Azreen Zakaria, 1986-, author<br/>Author Nor Azreen Zakaria, 1986-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034773 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS FRAMEWORK : A CASE STUDY FOR BANKING EMPLOYEES IN SUDANent://SD_ILS/0/SD_ILS:8604892024-05-18T21:19:14Z2024-05-18T21:19:14Zby Merghani Izzedlin Merghani, 1975-, author<br/>Author Merghani Izzedlin Merghani, 1975-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M476 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILADent://SD_ILS/0/SD_ILS:8605142024-05-18T21:19:14Z2024-05-18T21:19:14Zby al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H33 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILADent://SD_ILS/0/SD_ILS:8609502024-05-18T21:19:14Z2024-05-18T21:19:14Zby al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035020 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8609512024-05-18T21:19:14Z2024-05-18T21:19:14Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035021 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY AWARENESS MEASURING MODEL FOR EMPLOYEES OF THE SAUDI ARABIAN MONETARY AGENCY (SAMA)ent://SD_ILS/0/SD_ILS:8647442024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nawaf Omar Mohammed Basahih, author<br/>Author Nawaf Omar Mohammed Basahih, author, Othman Mohd. Yusop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035066 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2016<br/>DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNELent://SD_ILS/0/SD_ILS:8647472024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nur Alfa Mazlin Masdan, 1981-, author<br/>Author Nur Alfa Mazlin Masdan, 1981-, author, Nor Zairah Ab. Rahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035067 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENTent://SD_ILS/0/SD_ILS:8647682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Luqman Hakim Ibrahim, 1987-, author<br/>Author Luqman Hakim Ibrahim, 1987-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035071 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCYent://SD_ILS/0/SD_ILS:8648402024-05-18T21:19:14Z2024-05-18T21:19:14Zby Heng, Yee Lee, 1983-, author<br/>Author Heng, Yee Lee, 1983-, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H464 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>A FRAMEWORK FOR DATA LEAKAGE AND PREVENTION SOLUTION IN MALAYSIA AIRLINES SYSTEMent://SD_ILS/0/SD_ILS:8652842024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sharifah Izora Farah Syed Marzuki, 1966-, author<br/>Author Sharifah Izora Farah Syed Marzuki, 1966-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035103 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>EMPLOYEES' AWARENESS TOWARDS IT SECURITY MEASURES IMPLEMENTED IN THEIR ORGANIZATION : SELECTED FINANCIAL INSTITUTIONent://SD_ILS/0/SD_ILS:8654652024-05-18T21:19:14Z2024-05-18T21:19:14Zby Premala Nair Krishnakutty, 1986-, author<br/>Author Premala Nair Krishnakutty, 1986-, author, Kamilia Kamardin, Dr., 1982-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P746 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>EMPLOYEES' AWARENESS TOWARDS IT SECURITY MEASURES IMPLEMENTED IN THEIR ORGANIZATION : SELECTED FINANCIAL INSTITUTIONent://SD_ILS/0/SD_ILS:8657052024-05-18T21:19:14Z2024-05-18T21:19:14Zby Premala Nair Krishnakutty, 1986-, author<br/>Author Premala Nair Krishnakutty, 1986-, author, Kamilia Kamardin, Dr., 1982-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035118 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATIONent://SD_ILS/0/SD_ILS:8708282024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc. Prof. Dr., supervisor, Bharanidharan Shanmugam, Dr., supervisor, Mohd. Shahidan Abdullah, Assoc. Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HM742 S26 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>ENHANCING DATA PRIVACY IN REMOTE MONITORING OF HYPERTENSION/HYPOTENSION PATIENTS USING AES ALGORITHMent://SD_ILS/0/SD_ILS:8710092024-05-18T21:19:14Z2024-05-18T21:19:14Zby Deepa Rajandran, 1986-, author<br/>Author Deepa Rajandran, 1986-, author, Kamilia Kamardin, Dr., 1982-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 D447 2016 raf<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2016<br/>FACTORS INFLUENCING DATA LEAKAGE BEHAVIOUR IN MALAYSIAN ARMED FORCESent://SD_ILS/0/SD_ILS:8712722024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mohd. Nazrul Mat Zom, 1985-, author<br/>Author Mohd. Nazrul Mat Zom, 1985-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6433 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>ASSESSMENT ON DATA LEAKAGE PROTECTION FOR CHIEF GOVERMENT SECURITY OFFICEent://SD_ILS/0/SD_ILS:8712732024-05-18T21:19:14Z2024-05-18T21:19:14Zby Kumarendren Rajendran, 1980-, author<br/>Author Kumarendren Rajendran, 1980-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 K86 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANYent://SD_ILS/0/SD_ILS:8712832024-05-18T21:19:14Z2024-05-18T21:19:14Zby Hairunnazri Haron, 1985-, author<br/>Author Hairunnazri Haron, 1985-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H35 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8712882024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N671 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>USERS' AWARENESS OF MULTIMEDIA CONTENT PROTECTIONent://SD_ILS/0/SD_ILS:8363362024-05-18T21:19:14Z2024-05-18T21:19:14Zby Roslinda Muda, 1977-, author<br/>Author Roslinda Muda, 1977-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.575 R676 2011 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>The Complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:8372982024-05-18T21:19:14Z2024-05-18T21:19:14Zby Raghunathan, Balaji author<br/>Author Raghunathan, Balaji author<br/>Format: Books<br/>Call Number QA76.9.A25 R348 2013<br/>ISBN 9781439877302<br/>MODELLING OF PRIVACY PROTECTION IN SOCIAL NETWORKING USERS' WILLINGNESS TO PROVIDE PERSONAL INFORMATIONent://SD_ILS/0/SD_ILS:8378682024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nur Farhana Jalalluddin, 1988-, author<br/>Author Nur Farhana Jalalluddin, 1988-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 N87 2013 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>MODELLING OF PRIVACY PROTECTION IN SOCIAL NETWORKING USERS' WILLINGNESS TO PROVIDE PERSONAL INFORMATIONent://SD_ILS/0/SD_ILS:8378692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nur Farhana Jalalluddin, 1988-, author<br/>Author Nur Farhana Jalalluddin, 1988-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034147 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378772024-05-18T21:19:14Z2024-05-18T21:19:14Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390922024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number T58.64 M663 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Analyzing security behaviour in managing passwords among staffs of community collegesent://SD_ILS/0/SD_ILS:8405062024-05-18T21:19:14Z2024-05-18T21:19:14Zby Hazila Hasan, 1981-<br/>Author Hazila Hasan, 1981-, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033991 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>INFORMATION SECURITY AWARENESS : CASE STUDY IN UNIVERSAL STOCK-BROKINGent://SD_ILS/0/SD_ILS:8593082024-05-18T21:19:14Z2024-05-18T21:19:14Zby Faizatul Akma Mohd. Adnan, 1984-, author<br/>Author Faizatul Akma Mohd. Adnan, 1984-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 F35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia,2014<br/>AN EFFECTIVE MODEL TO MEASURE STUDENTS’ AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCEent://SD_ILS/0/SD_ILS:8593362024-05-18T21:19:14Z2024-05-18T21:19:14Zby al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author al-Idriss, Sultan Faydullah M., 1987-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S858 2014 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/>AN EFFECTIVE MODEL TO MEASURE STUDENTS’ AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCEent://SD_ILS/0/SD_ILS:8596052024-05-18T21:19:14Z2024-05-18T21:19:14Zby al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author al-Idriss, Sultan Faydullah M., 1987-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034735 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/>INFORMATION SECURITY AWARENESS : CASE STUDY IN UNIVERSAL STOCK-BROKINGent://SD_ILS/0/SD_ILS:8596152024-05-18T21:19:14Z2024-05-18T21:19:14Zby Faizatul Akma Mohd. Adnan, 1984-, author<br/>Author Faizatul Akma Mohd. Adnan, 1984-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034736 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia,2014<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8605692024-05-18T21:19:14Z2024-05-18T21:19:14Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.8855 Y38 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY AWARENESS FRAMEWORK : A CASE STUDY FOR BANKING EMPLOYEES IN SUDANent://SD_ILS/0/SD_ILS:8609912024-05-18T21:19:14Z2024-05-18T21:19:14Zby Merghani Izzedlin Merghani, 1975-, author<br/>Author Merghani Izzedlin Merghani, 1975-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035036 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Frameworkent://SD_ILS/0/SD_ILS:8627372024-05-18T21:19:14Z2024-05-18T21:19:14Zby Heng, Shun Ling, author<br/>Author Heng, Shun Ling, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H46 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Frameworkent://SD_ILS/0/SD_ILS:8629392024-05-18T21:19:14Z2024-05-18T21:19:14Zby Heng, Shun Ling, author<br/>Author Heng, Shun Ling, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035044 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A FRAMEWORK FOR DATA STORAGE SECURITY IN CLOUD COMPUTING RELATING TO DATA INTEGRITY, PRIVACY AND TRUSTent://SD_ILS/0/SD_ILS:8646672024-05-18T21:19:14Z2024-05-18T21:19:14Zby Negin Mirjafari, 1991-, author<br/>Author Negin Mirjafari, 1991-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.585 N44 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY AWARENESS MEASURING MODEL FOR EMPLOYEES OF THE SAUDI ARABIAN MONETARY AGENCY (SAMA)ent://SD_ILS/0/SD_ILS:8646702024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nawaf Omar Mohammed Basahih, author<br/>Author Nawaf Omar Mohammed Basahih, author, Othman Mohd. Yusop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N393 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2016<br/>DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNELent://SD_ILS/0/SD_ILS:8646712024-05-18T21:19:14Z2024-05-18T21:19:14Zby Nur Alfa Mazlin Masdan, 1981-, author<br/>Author Nur Alfa Mazlin Masdan, 1981-, author, Nor Zairah Ab. Rahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 N873 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENTent://SD_ILS/0/SD_ILS:8646732024-05-18T21:19:14Z2024-05-18T21:19:14Zby Luqman Hakim Ibrahim, 1987-, author<br/>Author Luqman Hakim Ibrahim, 1987-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 L87 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>A FRAMEWORK FOR DATA STORAGE SECURITY IN CLOUD COMPUTING RELATING TO DATA INTEGRITY, PRIVACY AND TRUSTent://SD_ILS/0/SD_ILS:8647372024-05-18T21:19:14Z2024-05-18T21:19:14Zby Negin Mirjafari, 1991-, author<br/>Author Negin Mirjafari, 1991-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035064 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>A FRAMEWORK FOR DATA LEAKAGE AND PREVENTION SOLUTION IN MALAYSIA AIRLINES SYSTEMent://SD_ILS/0/SD_ILS:8649762024-05-18T21:19:14Z2024-05-18T21:19:14Zby Sharifah Izora Farah Syed Marzuki, 1966-, author<br/>Author Sharifah Izora Farah Syed Marzuki, 1966-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.D314 S53 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>AWARENESS IMPLEMENTATION DATA LEAKAGE FOR THE CLOUD SECURITY IN UNIVERSITI TEKNOLOGI MALAYSIA (UTM)ent://SD_ILS/0/SD_ILS:8649832024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mazliza Aini Abdul Majid, 1979-, author<br/>Author Mazliza Aini Abdul Majid, 1979-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 M39 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCYent://SD_ILS/0/SD_ILS:8651022024-05-18T21:19:14Z2024-05-18T21:19:14Zby Heng, Yee Lee, 1983-, author<br/>Author Heng, Yee Lee, 1983-, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035090 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>AWARENESS IMPLEMENTATION DATA LEAKAGE FOR THE CLOUD SECURITY IN UNIVERSITI TEKNOLOGI MALAYSIA (UTM)ent://SD_ILS/0/SD_ILS:8652872024-05-18T21:19:14Z2024-05-18T21:19:14Zby Mazliza Aini Abdul Majid, 1979-, author<br/>Author Mazliza Aini Abdul Majid, 1979-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035106 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>POLICY GUIDELINES TO IMPROVE DATA GOVERNANCE IN UNIVERSITY COLLEGE OF AGROSCIENCE MALAYSIA : A CASE STUDYent://SD_ILS/0/SD_ILS:8660232024-05-18T21:19:14Z2024-05-18T21:19:14Zby Rohayu A. Wahid, 1979-, author<br/>Author Rohayu A. Wahid, 1979-, author, Norbik Bashah Idris, Prof.Dato'.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 R64 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8721212024-05-18T21:19:14Z2024-05-18T21:19:14Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064085 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>